See the release notes:
- https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2
- https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.3
This fixes the following vulnerability:
- CVE-2024-47619:
syslog-ng is an enhanced log daemo. Prior to version 4.8.2,
`tls_wildcard_match()` matches on certificates such as `foo.*.bar`
although that is not allowed. It is also possible to pass partial
wildcards such as `foo.a*c.bar` which glib matches but should be
avoided / invalidated. This issue could have an impact on TLS
connections, such as in man-in-the-middle situations. Version 4.8.2
contains a fix for the issue.
https://www.cve.org/CVERecord?id=CVE-2024-47619
Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>
Signed-off-by: Julien Olivain <ju.o@free.fr>
(cherry picked from commit 7660818b4b)
Signed-off-by: Titouan Christophe <titouan.christophe@mind.be>
6 lines
363 B
Plaintext
6 lines
363 B
Plaintext
# Locally computed
|
|
sha256 f82732a8e639373037d2b69c0e6d5d6594290f0350350f7a146af4cd8ab9e2c7 syslog-ng-4.8.3.tar.gz
|
|
sha256 d7d51f8d0f6ee9757a371080e7f5fa19ac73afbef14db6e981705cf1ec813d6b COPYING
|
|
sha256 ce3324c9f22299cfc7c281e5a6ab40fbe9c2ea1a67cee87226cb8cd39db1e1d2 GPL.txt
|
|
sha256 dc626520dcd53a22f727af3ee42c770e56c97a64fe3adb063799d8ab032fe551 LGPL.txt
|