Search for packages
| purl | pkg:deb/debian/syslog-ng@2.0.0-1etch1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-9s6e-ubst-rude
Aliases: CVE-2011-1951 |
Affected by 2 other vulnerabilities. |
|
|
VCID-ct3h-e6nt-hbbe
Aliases: CVE-2022-38725 |
An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected. |
Affected by 1 other vulnerability. |
|
VCID-dudn-nx52-qfe8
Aliases: CVE-2011-0343 |
Affected by 3 other vulnerabilities. |
|
|
VCID-hdcc-cab9-x3eu
Aliases: CVE-2024-47619 |
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue. |
Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-ka3z-2wmv-8ygm
Aliases: CVE-2007-6437 |
syslog-ng crash by message with invalid timestamp separator |
Affected by 4 other vulnerabilities. |
|
VCID-qh34-y4u6-zqgs
Aliases: CVE-2008-5110 |
syslog-ng improper chroot |
Affected by 4 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||