Bug 3978

Summary: rsyslog missing security update for CVE-2011-3200
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact:
Severity: normal    
Priority: Normal CC: arnaud.patard, davidwhodgins, dmorganec, mageia, mageia, mageia, mageia, misc, sysadmin-bugs, tmb
Version: 1Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Source RPM: rsyslog-5.6.2-4.mga1.src.rpm CVE:
Status comment:

Description David Walser 2012-01-01 03:03:44 CET
Mandriva issued these advisories:
September 9 (2010.1) - http://lists.mandriva.com/security-announce/2011-09/msg00008.php
September 17 (2011) - http://lists.mandriva.com/security-announce/2011-09/msg00016.php

The 2010.1 update includes a patch for 4.6.2, so I'm not sure if that'll apply to our 5.6.2.  For 2011 they just updated it to 5.8.5 rather than patching it.
Comment 1 Manuel Hiebel 2012-01-01 12:37:44 CET
Hi, thanks for reporting this bug.
As there is no maintainer for this package I added the committers in CC.

(Please set the status to 'assigned' if you are working on it)

CC: (none) => arnaud.patard, dmorganec, guillomovitch, mageia, mageia, mageia, misc

Guillaume Rousse 2012-01-02 10:14:25 CET

CC: guillomovitch => (none)

Comment 2 Manuel Hiebel 2012-01-16 17:00:58 CET
Ping ?
Comment 3 Manuel Hiebel 2012-02-01 10:57:15 CET
Ping ?
Comment 4 David Walser 2012-02-18 23:21:09 CET
What should we do with this?  The upstream commit to fix this is here:
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e

Should we patch this, or update to newest stable (now 5.8.7) as MDV did for 2011?

Quoting upstream:
"in general it is less secure to run outdated versions"

http://www.rsyslog.com/potential-dos-with-malformed-tag/
Comment 5 Sander Lepik 2012-02-19 09:33:17 CET
AFAIK our policy is to patch if it's possible. And only upgrade to new version if patching is not possible or it's way too much work.

CC: (none) => sander.lepik

Comment 6 Colin Guthrie 2012-02-19 20:45:12 CET
That is our policy generally I agree, but looking at Mandriva and Fedora (for both F15 and F16), they've both gone with newer versions wholesale. As there is no maintainer for rsyslog I'd be willing to push a newer version if no one has a massive objection?

Picking out the patches seems a bit of a pain.
Comment 7 David Walser 2012-02-19 20:57:28 CET
(In reply to comment #6)
> That is our policy generally I agree, but looking at Mandriva and Fedora (for
> both F15 and F16), they've both gone with newer versions wholesale. As there is
> no maintainer for rsyslog I'd be willing to push a newer version if no one has
> a massive objection?
> 
> Picking out the patches seems a bit of a pain.

Exactly.  Of course I know our policy, but I asked because of what others did, including Mandriva, who has the same policy we do.  Also, being that others have pushed the newer version, the software itself should be sufficiently well tested.

Please proceed Colin :o)   Thanks.
Comment 8 David Walser 2012-02-20 00:02:46 CET
Thanks Colin.  Just one minor note, new versions should have release 1 and no subrel:
https://wiki.mageia.org/en/Updates_policy#Maintainer_.28or_any_interested_packager.29
Comment 9 Colin Guthrie 2012-02-20 00:12:03 CET
OK, I've updated to the latest rsyslog as per the other distros. Works fine on
my mga1 box.

Please can other folk test for regressions and make sure it still works etc.
etc. If you can test the CVE then great but as it's the upstream version, I
think checking to make sure it works OK generally is enough.

I did forget about the whole subrel thing (and actually just put rel as 0.1 as per what I usually do locally... silly me!). Anyway, it can get bumped to 1 before pushing if no issues are found.
Comment 10 David Walser 2012-02-20 00:14:06 CET
Fair enough.  Can we assign to QA?
Comment 11 Dave Hodgins 2012-02-20 00:56:40 CET
Not much point assigning the bug report to qa when a new rpm has to
be built for the version/release number, as we have to re-test the
new rpm anyway (to ensure package is signed, installs cleanly, etc.).

Anyway, the update installed cleanly, rsyslog restarted and is working
fine here, on my i586 system.

CC: (none) => davidwhodgins

Comment 12 David Walser 2012-02-20 01:03:03 CET
Thanks Dave.  I talked to Colin on IRC and we'll let this get some "informal" testing for a while this week before rebuilding and assigning to QA for final release.  This version actually just hit Cauldron yesterday, so it'll get some testing there too.
Comment 13 David Walser 2012-02-21 15:40:46 CET
Writing the advisory (sans packages list, which will be posted once the final packages are made with the correct release tag).

Advisory:
========================

Updated rsyslog packages fix security vulnerabilities:

Stack-based buffer overflow in the parseLegacySyslogMsg function
in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and
5.2.0 through 5.8.4 might allow remote attackers to cause a denial of
service (application exit) via a long TAG in a legacy syslog message
(CVE-2011-3200).

rsyslog has been updated to version 5.8.7 which is not vulnerable to this issue.

References:
http://www.rsyslog.com/potential-dos-with-malformed-tag/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200
http://www.mandriva.com/en/support/security/advisories/?dis=2011&name=MDVSA-2011:134-1
Comment 14 Colin Guthrie 2012-02-21 15:51:06 CET
Not had any issues on my box, so I guess it's time to push out for proper QA. Bumped rel to 1 and submitted.
Comment 15 David Walser 2012-02-21 16:58:59 CET
OK, assigning to QA.

Advisory:
========================

Updated rsyslog packages fix security vulnerabilities:

Stack-based buffer overflow in the parseLegacySyslogMsg function
in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and
5.2.0 through 5.8.4 might allow remote attackers to cause a denial of
service (application exit) via a long TAG in a legacy syslog message
(CVE-2011-3200).

rsyslog has been updated to version 5.8.7 which is not vulnerable to this
issue.

References:
http://www.rsyslog.com/potential-dos-with-malformed-tag/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200
http://www.mandriva.com/en/support/security/advisories/?dis=2011&name=MDVSA-2011:134-1
========================

Updated packages in core/updates_testing:
========================
rsyslog-5.8.7-1.mga1
rsyslog-dbi-5.8.7-1.mga1
rsyslog-docs-5.8.7-1.mga1
rsyslog-gssapi-5.8.7-1.mga1
rsyslog-mysql-5.8.7-1.mga1
rsyslog-pgsql-5.8.7-1.mga1
rsyslog-relp-5.8.7-1.mga1
rsyslog-snmp-5.8.7-1.mga1

from rsyslog-5.8.7-1.mga1.src.rpm

Assignee: bugsquad => qa-bugs

Comment 16 Dave Hodgins 2012-02-22 01:22:36 CET
Testing on i586 complete for the srpm
rsyslog-5.8.7-1.mga1.src.rpm

As the latest change was just a version number change, and the
packages install cleanly, I've been running the updated
version for three days without any problems.

Looking at https://bugzilla.redhat.com/show_bug.cgi?id=727644
it seems they've chosen to keep the "reproducer" private,
so we can't actually test the fix.
Comment 17 claire robinson 2012-02-23 12:12:24 CET
No regression noticed x86_64 with updated packages so I think we can validate this.

As Dave says, the details have not been made public and even they themselves were saying it is difficult to reproduce so I think regression checking is sufficient.

Update validated.

Please see comment 15 for advisory etc.

Could sysadmin please push from core/updates_testing to core/updates

Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs
Hardware: i586 => All

Comment 18 Thomas Backlund 2012-02-24 21:06:46 CET
update pushed

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED