QID 353957

Date Published: 2022-06-13

QID 353957: Amazon Linux Security Advisory for rsyslog : ALAS-2022-1594

A flaw was found in the way rsyslog handled invalid log message priority values.
In certain configurations, a local attacker, or a remote attacker able to connect to the rsyslog port, could use this flaw to crash the rsyslog daemon or, potentially in rsyslog 7.x, execute arbitrary code as the user running the rsyslog daemon. (
( CVE-2014-3634) a flaw was found in rsyslog's reception tcp modules.
This flaw allows an attacker to craft a malicious message leading to a heap-based buffer overflow.
This issue allows the attacker to corrupt or access data stored in memory, leading to a denial of service in the rsyslog or possible remote code execution. (
( CVE-2022-24903)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1594 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 353957

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1594 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1594.html