import rsyslog-8.2102.0-101.el9_0.1
This commit is contained in:
parent
e3ce71028a
commit
5e508fd88e
30
SOURCES/rsyslog-8.37.0-rhbz2081396-CVE-2022-24903.patch
Normal file
30
SOURCES/rsyslog-8.37.0-rhbz2081396-CVE-2022-24903.patch
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
diff -up rsyslog-8.37.0/plugins/imptcp/imptcp.c.orig rsyslog-8.37.0/plugins/imptcp/imptcp.c
|
||||||
|
--- rsyslog-8.37.0/plugins/imptcp/imptcp.c.orig 2022-05-09 12:22:59.050623119 +0200
|
||||||
|
+++ rsyslog-8.37.0/plugins/imptcp/imptcp.c 2022-05-09 12:34:39.979854853 +0200
|
||||||
|
@@ -1032,7 +1032,10 @@ processDataRcvd(ptcpsess_t *const __rest
|
||||||
|
if(pThis->iOctetsRemain <= 200000000) {
|
||||||
|
pThis->iOctetsRemain = pThis->iOctetsRemain * 10 + c - '0';
|
||||||
|
}
|
||||||
|
- *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ // *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ if(pThis->iMsg < iMaxLine) {
|
||||||
|
+ *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ }
|
||||||
|
} else { /* done with the octet count, so this must be the SP terminator */
|
||||||
|
DBGPRINTF("TCP Message with octet-counter, size %d.\n", pThis->iOctetsRemain);
|
||||||
|
prop.GetString(pThis->peerName, &propPeerName, &lenPeerName);
|
||||||
|
diff -up rsyslog-8.37.0/runtime/tcps_sess.c.orig rsyslog-8.37.0/runtime/tcps_sess.c
|
||||||
|
--- rsyslog-8.37.0/runtime/tcps_sess.c.orig 2022-05-09 12:23:12.789627661 +0200
|
||||||
|
+++ rsyslog-8.37.0/runtime/tcps_sess.c 2022-05-09 12:36:51.426898549 +0200
|
||||||
|
@@ -389,7 +389,10 @@ processDataRcvd(tcps_sess_t *pThis,
|
||||||
|
if(pThis->iOctetsRemain <= 200000000) {
|
||||||
|
pThis->iOctetsRemain = pThis->iOctetsRemain * 10 + c - '0';
|
||||||
|
}
|
||||||
|
- *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ // *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ if(pThis->iMsg < iMaxLine) {
|
||||||
|
+ *(pThis->pMsg + pThis->iMsg++) = c;
|
||||||
|
+ }
|
||||||
|
} else { /* done with the octet count, so this must be the SP terminator */
|
||||||
|
DBGPRINTF("TCP Message with octet-counter, size %d.\n", pThis->iOctetsRemain);
|
||||||
|
prop.GetString(pThis->fromHost, &propPeerName, &lenPeerName);
|
@ -5,7 +5,7 @@
|
|||||||
Summary: Enhanced system logging and kernel message trapping daemon
|
Summary: Enhanced system logging and kernel message trapping daemon
|
||||||
Name: rsyslog
|
Name: rsyslog
|
||||||
Version: 8.2102.0
|
Version: 8.2102.0
|
||||||
Release: 101%{?dist}
|
Release: 101%{?dist}.1
|
||||||
License: (GPLv3+ and ASL 2.0)
|
License: (GPLv3+ and ASL 2.0)
|
||||||
URL: http://www.rsyslog.com/
|
URL: http://www.rsyslog.com/
|
||||||
Source0: http://www.rsyslog.com/files/download/rsyslog/%{name}-%{version}.tar.gz
|
Source0: http://www.rsyslog.com/files/download/rsyslog/%{name}-%{version}.tar.gz
|
||||||
@ -26,6 +26,7 @@ Patch4: rsyslog-8.2102.0-rhbz1984616-imuxsock-ratelimit.patch
|
|||||||
Patch5: rsyslog-8.2102.0-rhbz1984489-remove-abort-on-id-resolution-fail.patch
|
Patch5: rsyslog-8.2102.0-rhbz1984489-remove-abort-on-id-resolution-fail.patch
|
||||||
Patch6: rsyslog-8.2102.0-rhbz1938863-covscan.patch
|
Patch6: rsyslog-8.2102.0-rhbz1938863-covscan.patch
|
||||||
Patch7: rsyslog-8.2102.0-rhbz2021076-prioritize-SAN.patch
|
Patch7: rsyslog-8.2102.0-rhbz2021076-prioritize-SAN.patch
|
||||||
|
Patch8: rsyslog-8.37.0-rhbz2081396-CVE-2022-24903.patch
|
||||||
|
|
||||||
BuildRequires: make
|
BuildRequires: make
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
@ -264,6 +265,7 @@ mv build doc
|
|||||||
%patch5 -p1 -b .abort-on-id-resolution-fail
|
%patch5 -p1 -b .abort-on-id-resolution-fail
|
||||||
%patch6 -p1 -b .covscan
|
%patch6 -p1 -b .covscan
|
||||||
%patch7 -p1 -b .prioritize-SAN
|
%patch7 -p1 -b .prioritize-SAN
|
||||||
|
%patch8 -p1 -b .CVE-24903
|
||||||
|
|
||||||
pushd ..
|
pushd ..
|
||||||
%patch0 -p1 -b .openssl-compatibility
|
%patch0 -p1 -b .openssl-compatibility
|
||||||
@ -528,6 +530,10 @@ done
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue May 10 2022 Attila Lakatos <alakatos@redhat.com> - 8.2102.0-101.1
|
||||||
|
- Address CVE-2022-24903, Heap-based overflow in TCP syslog server
|
||||||
|
resolves: rhbz#2081402
|
||||||
|
|
||||||
* Wed Jan 19 2022 Sergio Arroutbi <sarroutb@redhat.com> - 8.2102.0-101
|
* Wed Jan 19 2022 Sergio Arroutbi <sarroutb@redhat.com> - 8.2102.0-101
|
||||||
- Prioritize SAN
|
- Prioritize SAN
|
||||||
resolves: rhbz#2021076
|
resolves: rhbz#2021076
|
||||||
|
Loading…
Reference in New Issue
Block a user