Buffer Overflow The advisory has been revoked - it doesn't affect any version of package sysstat-debugsource  (opens in a new tab)


Threat Intelligence

EPSS
0.59% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-SYSSTATDEBUGSOURCE-3111404
  • published9 Nov 2022
  • disclosed8 Nov 2022

Introduced: 8 Nov 2022

CVE-2022-39377  (opens in a new tab)
CWE-120  (opens in a new tab)
CWE-131  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sysstat-debugsource package and not the sysstat-debugsource package as distributed by RHEL.

sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.