Changelog for 4.7.5 (v4-beta)
Version 4.7.5 [v4-beta], 2011-09-01
- bugfix/security: off-by-two bug in legacy syslog parser, CVE-2011-3200
- bugfix: potential misadressing in property replacer
- bugfix: The NUL-Byte for the syslogtag was not copied in MsgDup (msg.c)
rsyslog 4.7.5 (v4-beta)
Download file name: rsyslog 4.7.5 (beta)
rsyslog 4.7.5 (beta)
md5sum: 03426b24a438cedc31d7050698624716
Author: Rainer Gerhards (rgerhards@adiscon.com)
Version: 4.7.5 File size: 2.128 MB
rsyslog 5.8.5 (v5-stable)
Download file name: rsyslog 5.8.5 (stable)
rsyslog 5.8.5 (stable)
md5sum: a73cb577cb4bc5b9c8f0d217eb054ad2
Author: Rainer Gerhards (rgerhards@adiscon.com)
Version: 5.8.5 File size: 2.365 MB
Changelog for 5.8.5 (v5-stable)
Version 5.8.5 [V5-stable] (rgerhards/al), 2011-09-01
- bugfix: security: off-by-two bug in legacy syslog parser, CVE-2011-3200
- bugfix: mark message processing did not work correctly
- bugfix: potential hang condition during tag emulation
- bugfix: too-early string termination during tag emulation
- bugfix: The NUL-Byte for the syslogtag was not copied in MsgDup (msg.c)
- bugfix: fixed incorrect state handling for Discard Action (transactions)
Note: This caused all messages in a batch to be set to COMMITTED, even if they were discarded.
rsyslog 4.6.8 (v4-stable)
Download file name: rsyslog 4.6.8 (stable)
rsyslog 4.6.8 (stable)
md5sum: cfd2d0c3b536fed9c67603c7533449c3
Author: Rainer Gerhards (rgerhards@adiscon.com)
Version: 4.6.8 File size: 2.077 MB
Changelog for 4.6.8 (v4-stable)
Version 4.6.8 [v4-stable] (rgerhards), 2011-09-01
- bugfix/security: off-by-two bug in legacy syslog parser, CVE-2011-3200
- bugfix: potential misadressing in property replacer
- bugfix: memcpy overflow can occur in allowed sender checking if a name is resolved to IPv4-mapped-on-IPv6 address
Found by Ismail Dönmez at suse - bugfix: The NUL-Byte for the syslogtag was not copied in MsgDup (msg.c)
Potential DoS with malformed TAG
If a malformed, severely too long TAG is used in legacy (RFC3164) syslog messages, rsyslog can abort based on the conditions described in this security advisory.
CVE: CVE-2011-3200
Affected Stable Versions:
v4.6.0 to 4.6.7 (inclusive)
v5.2.0 to 5.8.4 (inclusive)
Devel and Beta versions are probably also affected, but are not suitable for production and thus not analyzed in detail. Version 3 is not affeceted. Versions prior to 3 have not been analyzed.
Fix:
Update to 4.6.8 or 5.8.5. The fix is also included in the following non-beta versions: 4.7.5, 5.9.3, 6.1.12, 6.3.5.
For non current affected versions, the following patches can most probably be applied: v4, v5. Note that due to the myriad of different versions we can not provide individual patches for all outdated versions (and in general it is less secure to run outdated versions).
Short Description:
An excessively long TAG inside a legacy syslog message can lead to a two-byte stack buffer overflow. If rsyslog has been compiled with stack guard, this can lead to an abort. This has been seen on 32bit platforms, but not on 64 bit ones (though not outruled there). If not compiled with stack guard, no fatal problem occurs and the tag character is usually just truncated. Exact behaviour depends on the platform and may be slightly different on compilers different from gcc and/or non-Intel architecture machines.
rsyslog 5.8.4 (v5-stable) released
This release contains several bugfixes for potential misadressing in the property replacer, memcpy overflow in allowed sender checking and more. For more detailed information, please read the changelog.
ChangeLog:
http://www.rsyslog.com/changelog-for-5-8-4-v5-stable/
Download:
http://www.rsyslog.com/rsyslog-5-8-4-v5-stable/
As always, feedback is appreciated.
Best regards,
Florian Riedl
rsyslog 5.8.4 (v5-stable)
Download file name: rsyslog 5.8.4 (stable)
rsyslog 5.8.4 (stable)
md5sum: a2c2a65ac84d9a895c52a754aff61986
Author: Rainer Gerhards (rgerhards@adiscon.com)
Version: 5.8.4 File size: 2.357 MB
Changelog for 5.8.4 (v5-stable)
Version 5.8.4 [V5-stable] (al), 2011-08-10
- bugfix: potential misadressing in property replacer
- bugfix: memcpy overflow can occur in allowed sender checking if a name is resolved to IPv4-mapped-on-IPv6 address
Found by Ismail Dömez at Suse - bugfix: MSGID corruption in RFC5424 parser under some circumstances
closes: http://bugzilla.adiscon.com/show_bug.cgi?id=275