Name | CVE-2022-38725 |
Description | An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3348-1, DSA-5369-1, ELA-832-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
syslog-ng (PTS) | jessie, jessie (lts) | 3.5.6-2+deb8u2 | fixed |
stretch (lts), stretch | 3.8.1-10+deb9u1 | fixed | |
buster (security), buster, buster (lts) | 3.19.1-5+deb10u1 | fixed | |
bullseye (security), bullseye | 3.28.1-2+deb11u1 | fixed | |
bookworm | 3.38.1-5 | fixed | |
sid, trixie | 4.8.1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
syslog-ng | source | jessie | 3.5.6-2+deb8u1 | ELA-832-1 | ||
syslog-ng | source | stretch | 3.8.1-10+deb9u1 | ELA-832-1 | ||
syslog-ng | source | buster | 3.19.1-5+deb10u1 | DLA-3348-1 | ||
syslog-ng | source | bullseye | 3.28.1-2+deb11u1 | DSA-5369-1 | ||
syslog-ng | source | (unstable) | 3.38.1-1 |
https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc
https://github.com/syslog-ng/syslog-ng/pull/4110