-
Bug
-
Resolution: Done-Errata
-
Undefined
-
rhel-8.10
-
rsyslog-8.2102.0-15.el8_10.1
-
No
-
Important
-
Customer Escalated, Customer Facing, Customer Reported
-
3
-
rhel-sst-security-special-projects
-
ssg_security
-
None
-
False
-
-
None
-
Red Hat Enterprise Linux
-
SECENGSP Cycle 8, SECENGSP Cycle 9, SECENGSP Cycle 10
-
- If the gnutlsPriorityString is used, the values are respected and the encrypted communication can be utilized using ciphers mentioned inside the option. Both servers and clients must respect the parameters.
-
Pass
-
Automated
-
-
x86_64
-
None
Customer opened a case to ask a bug of rsyslog,below is the details,
To avoid the use of medium strength ciphers, it's necessary to reconfigure rsyslog to restrict the cipher suites used for TLS communication. However the bug of rsyslog v8 in
https://github.com/rsyslog/rsyslog/pull/4692
is blocking the restriction from taking effect. The bug in PR#4692 is fixed in rsyslog v8.2110 or higher. But it's not available in RHEL8. It looks rsyslog-8.2310.0 is already availabe in RHEL9 (
https://access.redhat.com/downloads/content/rsyslog/8.2310.0-4.el9/x86_64/fd431d51/package
). Would you please help raise a feature request to backport package rsyslog-8.2310.0 to RHEL8.10?
- links to
-
RHBA-2024:139581 rsyslog update