摘要:
zlog security update
安全等级: Critical
公告ID: KylinSec-SA-2024-5001
发布日期: 2024年11月1日
关联CVE: CVE-2024-22857
zlog is a reliable, high-performance, thread safe, flexible, clear-model, pure C logging library.
Security Fix(es):
Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new().The size of record_name is MAXLEN_PATH(1024) + 1 but file_path may have data upto MAXLEN_CFG_LINE(MAXLEN_PATH*4) + 1. So a check was missing in zlog_rule_new() while copying the record_name from file_path + 1 which caused the buffer overflow. An attacker can exploit this vulnerability to overwrite the zlog_record_fn record_func function pointer to get arbitrary code execution or potentially cause remote code execution (RCE).(CVE-2024-22857)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-22857 | V6 | zlog | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
zlog | x86_64 | 1.2.15-6.ks6 |
zlog | aarch64 | 1.2.15-6.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名