rsyslog: set status for CVE-2015-3243

Details: https://nvd.nist.gov/vuln/detail/CVE-2015-3243

The issue is about file permissions: by default rsyslog creates world-readable
files. In case a log message contains some sensitive information, then that's
exposed to every user on the system.

However the rsyslog.conf file that is shipped with the recipe solves it: it
already sets non-world-readable default permissions on all files, so this
vulnerability is fixed in the default OE recipe.

See also this package in OpenSuse[1], where it is solved the same way.

[1]: https://build.opensuse.org/requests/619439/changes (rsyslog.conf.in)

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
This commit is contained in:
Gyorgy Sarvari 2025-11-14 13:48:45 +01:00 committed by Khem Raj
parent fe8d5e0cc0
commit 38ea8a4617
No known key found for this signature in database
GPG Key ID: BB053355919D3314
2 changed files with 2 additions and 0 deletions

View File

@ -13,6 +13,7 @@ $ModLoad imklog # kernel logging (formerly provided by rklogd)
#
# Set the default permissions
# Setting the $FileCreateMode not world readable fixes CVE-2015-3243
#
$FileOwner root
$FileGroup adm

View File

@ -38,6 +38,7 @@ UPSTREAM_CHECK_URI = "https://github.com/rsyslog/rsyslog/tags"
UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)"
CVE_PRODUCT = "rsyslog:rsyslog"
CVE_STATUS[CVE-2015-3243] = "fix-file-included: The shipped default rsyslog.conf contains the fix"
inherit autotools pkgconfig systemd update-rc.d ptest