Full info:
https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8

You seem to mix up two different things.

HTH
Rainer

Sent from phone, thus brief.

Dmitry Antipov via rsyslog <rsyslog@lists.adiscon.com> schrieb am Fr., 13.
Mai 2022, 15:05:

> Hello,
>
> could someone please explain what (potential) buffer overrun is actually
> fixed by an upstream commit
> f211042ecbb472f9d8beb4678a65d272b6f07705? AFAICS both 'isValidHexNum()'
> and 'syntax_ipv6()' just parses
> the buffers passed in but seems doesn't _fill_ anything...
>
> Thanks,
> Dmitry
> _______________________________________________
> rsyslog mailing list
> https://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards
> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad
> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> DON'T LIKE THAT.
>
_______________________________________________
rsyslog mailing list
https://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to