diff --git a/SPECS/influxdb/CVE-2025-10543.patch b/SPECS/influxdb/CVE-2025-10543.patch new file mode 100644 index 00000000000..1c398665646 --- /dev/null +++ b/SPECS/influxdb/CVE-2025-10543.patch @@ -0,0 +1,33 @@ +From 99e87e5303de418336060151f8718453b6ece75a Mon Sep 17 00:00:00 2001 +From: AllSpark +Date: Wed, 17 Dec 2025 05:03:27 +0000 +Subject: [PATCH] packets: truncate encodeBytes to 65535 bytes to avoid + overflow of 16-bit length; add comments; backport test and fvt changes + skipped due to repository structure + +Signed-off-by: Azure Linux Security Servicing Account +Upstream-reference: AI Backport of https://patch-diff.githubusercontent.com/raw/eclipse-paho/paho.mqtt.golang/pull/714.patch +--- + .../github.com/eclipse/paho.mqtt.golang/packets/packets.go | 6 ++++++ + 1 file changed, 6 insertions(+) + +diff --git a/vendor/github.com/eclipse/paho.mqtt.golang/packets/packets.go b/vendor/github.com/eclipse/paho.mqtt.golang/packets/packets.go +index 42eeb46..a221a3d 100644 +--- a/vendor/github.com/eclipse/paho.mqtt.golang/packets/packets.go ++++ b/vendor/github.com/eclipse/paho.mqtt.golang/packets/packets.go +@@ -304,6 +304,12 @@ func decodeBytes(b io.Reader) ([]byte, error) { + } + + func encodeBytes(field []byte) []byte { ++ // Attempting to encode more than 65,535 bytes would lead to an unexpected 16-bit length and extra data written ++ // (which would be parsed as later parts of the message). The safest option is to truncate. ++ if len(field) > 65535 { ++ field = field[0:65535] ++ } ++ + fieldLength := make([]byte, 2) + binary.BigEndian.PutUint16(fieldLength, uint16(len(field))) + return append(fieldLength, field...) +-- +2.45.4 + diff --git a/SPECS/influxdb/influxdb.spec b/SPECS/influxdb/influxdb.spec index 3da89fa1557..eb001f35c2a 100644 --- a/SPECS/influxdb/influxdb.spec +++ b/SPECS/influxdb/influxdb.spec @@ -18,7 +18,7 @@ Summary: Scalable datastore for metrics, events, and real-time analytics Name: influxdb Version: 2.7.5 -Release: 9%{?dist} +Release: 10%{?dist} License: MIT Vendor: Microsoft Corporation Distribution: Azure Linux @@ -68,6 +68,7 @@ Patch9: CVE-2025-22870.patch Patch10: CVE-2024-51744.patch Patch11: CVE-2025-22872.patch Patch12: CVE-2025-65637.patch +Patch13: CVE-2025-10543.patch BuildRequires: clang BuildRequires: golang BuildRequires: kernel-headers @@ -157,6 +158,9 @@ go test ./... %{_tmpfilesdir}/influxdb.conf %changelog +* Wed Dec 17 2025 Azure Linux Security Servicing Account - 2.7.5-10 +- Patch for CVE-2025-10543 + * Mon Dec 08 2025 Azure Linux Security Servicing Account - 2.7.5-9 - Patch for CVE-2025-65637