<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">rsyslog-8.23.0-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10498</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">rsyslog-8.23.0-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the rsyslog-8.23.0-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10498</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10498</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3200/</URL>
      <Description>SUSE CVE CVE-2011-3200 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4758/</URL>
      <Description>SUSE CVE CVE-2013-4758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6370/</URL>
      <Description>SUSE CVE CVE-2013-6370 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6371/</URL>
      <Description>SUSE CVE CVE-2013-6371 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3634/</URL>
      <Description>SUSE CVE CVE-2014-3634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3683/</URL>
      <Description>SUSE CVE CVE-2014-3683 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-8.23.0-2.1">rsyslog-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-diag-tools-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-diag-tools-8.23.0-2.1">rsyslog-diag-tools-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-doc-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-doc-8.23.0-2.1">rsyslog-doc-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-dbi-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-dbi-8.23.0-2.1">rsyslog-module-dbi-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-elasticsearch-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-elasticsearch-8.23.0-2.1">rsyslog-module-elasticsearch-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-gcrypt-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-gcrypt-8.23.0-2.1">rsyslog-module-gcrypt-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-gssapi-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-gssapi-8.23.0-2.1">rsyslog-module-gssapi-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-gtls-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-gtls-8.23.0-2.1">rsyslog-module-gtls-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-guardtime-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-guardtime-8.23.0-2.1">rsyslog-module-guardtime-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-mmnormalize-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-mmnormalize-8.23.0-2.1">rsyslog-module-mmnormalize-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-mysql-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-mysql-8.23.0-2.1">rsyslog-module-mysql-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-omamqp1-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-omamqp1-8.23.0-2.1">rsyslog-module-omamqp1-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-omhttpfs-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-omhttpfs-8.23.0-2.1">rsyslog-module-omhttpfs-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-omtcl-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-omtcl-8.23.0-2.1">rsyslog-module-omtcl-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-pgsql-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-pgsql-8.23.0-2.1">rsyslog-module-pgsql-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-relp-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-relp-8.23.0-2.1">rsyslog-module-relp-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-snmp-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-snmp-8.23.0-2.1">rsyslog-module-snmp-8.23.0-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rsyslog-module-udpspoof-8.23.0-2.1">
      <FullProductName ProductID="rsyslog-module-udpspoof-8.23.0-2.1">rsyslog-module-udpspoof-8.23.0-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="rsyslog-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-8.23.0-2.1">rsyslog-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-diag-tools-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1">rsyslog-diag-tools-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-doc-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1">rsyslog-doc-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-dbi-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1">rsyslog-module-dbi-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-elasticsearch-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1">rsyslog-module-elasticsearch-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-gcrypt-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1">rsyslog-module-gcrypt-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-gssapi-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1">rsyslog-module-gssapi-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-gtls-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1">rsyslog-module-gtls-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-guardtime-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1">rsyslog-module-guardtime-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-mmnormalize-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1">rsyslog-module-mmnormalize-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-mysql-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1">rsyslog-module-mysql-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-omamqp1-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1">rsyslog-module-omamqp1-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-omhttpfs-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1">rsyslog-module-omhttpfs-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-omtcl-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1">rsyslog-module-omtcl-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-pgsql-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1">rsyslog-module-pgsql-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-relp-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1">rsyslog-module-relp-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-snmp-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1">rsyslog-module-snmp-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="rsyslog-module-udpspoof-8.23.0-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1">rsyslog-module-udpspoof-8.23.0-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.</Note>
    </Notes>
    <CVE>CVE-2011-3200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3200.html</URL>
        <Description>CVE-2011-3200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/714658</URL>
        <Description>SUSE Bug 714658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.</Note>
    </Notes>
    <CVE>CVE-2013-4758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4758.html</URL>
        <Description>CVE-2013-4758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/828140</URL>
        <Description>SUSE Bug 828140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2013-6370</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6370.html</URL>
        <Description>CVE-2013-6370</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870147</URL>
        <Description>SUSE Bug 870147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.</Note>
    </Notes>
    <CVE>CVE-2013-6371</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6371.html</URL>
        <Description>CVE-2013-6371</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/870147</URL>
        <Description>SUSE Bug 870147</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.</Note>
    </Notes>
    <CVE>CVE-2014-3634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3634.html</URL>
        <Description>CVE-2014-3634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897262</URL>
        <Description>SUSE Bug 897262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/899756</URL>
        <Description>SUSE Bug 899756</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.</Note>
    </Notes>
    <CVE>CVE-2014-3683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:rsyslog-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-diag-tools-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-doc-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-dbi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-elasticsearch-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gcrypt-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gssapi-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-gtls-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-guardtime-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mmnormalize-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-mysql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omamqp1-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omhttpfs-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-omtcl-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-pgsql-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-relp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-snmp-8.23.0-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:rsyslog-module-udpspoof-8.23.0-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3683.html</URL>
        <Description>CVE-2014-3683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897262</URL>
        <Description>SUSE Bug 897262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/899756</URL>
        <Description>SUSE Bug 899756</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
