Fixes the following security issue: CVE-2024-22857: Heap based buffer flow in zlog v1.1.0 to v1.2.17 in zlog_rule_new() https://github.com/advisories/GHSA-6q5p-rp5c-wmph Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
@@ -1,3 +1,3 @@
# Locally computed
-sha256 7fe412130abbb75a0779df89ae407db5d8f594435cc4ff6b068d924e13fd5c68 zlog-1.2.17.tar.gz
+sha256 3977dc8ea0069139816ec4025b320d9a7fc2035398775ea91429e83cb0d1ce4e zlog-1.2.18.tar.gz
sha256 c71d239df91726fc519c6eb72d318ec65820627232b2f796219e87dcf35d0ab4 LICENSE
@@ -4,7 +4,7 @@
#
################################################################################
-ZLOG_VERSION = 1.2.17
+ZLOG_VERSION = 1.2.18
ZLOG_SITE = $(call github,HardySimpson,zlog,$(ZLOG_VERSION))
ZLOG_LICENSE = Apache-2.0
ZLOG_LICENSE_FILES = LICENSE