First published: Wed May 07 2025(Updated: )
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
syslog-ng | <4.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47619 is classified as a moderate severity vulnerability.
To fix CVE-2024-47619, upgrade syslog-ng to version 4.8.2 or later.
CVE-2024-47619 affects all versions of syslog-ng prior to 4.8.2.
CVE-2024-47619 allows incorrect wildcard matching on certificates, leading to potential validation issues.
Currently, there are no established workarounds for CVE-2024-47619, and upgrading is recommended.