Full info: https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
You seem to mix up two different things. HTH Rainer Sent from phone, thus brief. Dmitry Antipov via rsyslog <rsyslog@lists.adiscon.com> schrieb am Fr., 13. Mai 2022, 15:05: > Hello, > > could someone please explain what (potential) buffer overrun is actually > fixed by an upstream commit > f211042ecbb472f9d8beb4678a65d272b6f07705? AFAICS both 'isValidHexNum()' > and 'syntax_ipv6()' just parses > the buffers passed in but seems doesn't _fill_ anything... > > Thanks, > Dmitry > _______________________________________________ > rsyslog mailing list > https://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > DON'T LIKE THAT. > _______________________________________________ rsyslog mailing list https://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.