Skip to content

Commit 6e57270

Browse files
committed
Update version to 4.0.0
- Update version strings across all files - Add comprehensive CHANGELOG with breaking changes documentation - Document AES encryption as new default (not backwards compatible with 3.8.0) - Document SHA-256 FIM enabled by default - Include all 17 PRs since 3.8.0 (4 security fixes, 13 improvements) Files updated: - Version files: src/VERSION, src/headers/defs.h, ossec-hids.spec - Windows files: src/win32/help.txt, src/win32/ossec-installer.nsi - Init scripts: src/init/ossec-{client,local,server}.sh - Documentation: INSTALL, README.md, CONFIG, BUGS - CHANGELOG.md with comprehensive release notes Security fixes: - UAF bugs (Issues #1817, #1818) - XML recursion vulnerability (Issue #1953) - Secure RNG implementation for agent keys Improvements: - FIM modernization with SHA-256 support - Library updates (Lua 5.4.7, zlib 1.3.1, cJSON 1.7.18) - Bug fixes and error handling improvements
1 parent ba6df83 commit 6e57270

File tree

13 files changed

+85
-13
lines changed

13 files changed

+85
-13
lines changed

BUGS

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
1-
OSSEC v3.8.0
2-
Copyright (C) 2019 Trend Micro Inc.
1+
OSSEC v4.0.0
32

43

54
** Reporting bugs **

CHANGELOG.md

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,73 @@
1+
**OSSEC changelog (4.0.0) <support@atomicorp.com>**
2+
3+
**Release Maintainers**
4+
5+
Dan Parriott
6+
7+
Scott R. Shinn (https://www.atomicorp.com)
8+
9+
**Contributors on this release**
10+
11+
- @atomicturtle
12+
13+
**Release Notes**
14+
15+
Major security and stability release addressing critical memory safety issues and modernizing cryptographic implementations. This release includes fixes for multiple heap use-after-free (UAF) vulnerabilities, uncontrolled recursion in XML parsing, and implementation of secure random number generation for agent key creation. Additionally, file integrity monitoring has been modernized with SHA-256 support, and several external dependencies have been updated to their latest stable versions.
16+
17+
**Breaking Changes**
18+
19+
> [!WARNING]
20+
> **AES Encryption Now Default for Agent Communication**
21+
>
22+
> OSSEC 4.0.0 agents now use AES encryption by default for agent-server communication. This is **NOT backwards compatible** with OSSEC 3.8.0 and older servers.
23+
>
24+
> **Migration Options:**
25+
>
26+
> 1. **Upgrade servers first** (recommended): Update all OSSEC servers to 4.0.0 before upgrading agents
27+
> 2. **Use legacy Blowfish encryption on 4.0.0 agents**: Add to agent `ossec.conf`:
28+
> ```xml
29+
> <client>
30+
> <crypto_method>blowfish</crypto_method>
31+
> </client>
32+
> ```
33+
34+
**Configuration Changes**
35+
36+
- **SHA-256 File Integrity Monitoring**: SHA-256 is now **enabled by default** for all monitored directories. No configuration changes are required.
37+
38+
- **To disable SHA-256** (if needed for compatibility):
39+
```xml
40+
<syscheck>
41+
<directories check_sha256sum="no">/etc</directories>
42+
</syscheck>
43+
```
44+
45+
**Security Fixes**
46+
47+
- @atomicturtle - [PR 2178](https://github.com/ossec/ossec-hids/pull/2178) - Fix critical UAF bug in memory leak fix (Issue #1818)
48+
- @atomicturtle - [PR 2177](https://github.com/ossec/ossec-hids/pull/2177) - Fix Issue #1817: Heap UAF in OSSEC Alert decoder with leak-free Eventinfo refactor
49+
- @atomicturtle - [PR 2175](https://github.com/ossec/ossec-hids/pull/2175) - Fix uncontrolled recursion in os_xml _ReadElem (Issue #1953)
50+
- @atomicturtle - [PR 2167](https://github.com/ossec/ossec-hids/pull/2167) - Implement secure RNG for agent key generation using OpenSSL RAND_bytes
51+
52+
**General**
53+
54+
- @atomicturtle - [PR 2174](https://github.com/ossec/ossec-hids/pull/2174) - Fix help/version argument exit codes
55+
- @atomicturtle - [PR 2173](https://github.com/ossec/ossec-hids/pull/2173) - Fix for Issue #2056 in syscheck decoder
56+
- @atomicturtle - [PR 2171](https://github.com/ossec/ossec-hids/pull/2171) - Ignore ENOENT in OS_RemoveCounter to prevent benign error messages
57+
- @atomicturtle - [PR 2170](https://github.com/ossec/ossec-hids/pull/2170) - Improve error message in ossec-testrule for missing rule matches (Issue #2093)
58+
- @atomicturtle - [PR 2169](https://github.com/ossec/ossec-hids/pull/2169) - Clean up redundant NULL checks in report filter function (Issue #2133)
59+
- @atomicturtle - [PR 2168](https://github.com/ossec/ossec-hids/pull/2168) - Improve logcollector crash fix to check read function pointer (Issue #2156)
60+
- @atomicturtle - [PR 2166](https://github.com/ossec/ossec-hids/pull/2166) - FIM modernization: SHA-256 integration and safe buffer handling
61+
- @atomicturtle - [PR 2165](https://github.com/ossec/ossec-hids/pull/2165) - Update Lua to version 5.4.7
62+
- @atomicturtle - [PR 2164](https://github.com/ossec/ossec-hids/pull/2164) - Update zlib to version 1.3.1
63+
- @atomicturtle - [PR 2163](https://github.com/ossec/ossec-hids/pull/2163) - Update cJSON to version 1.7.18
64+
- @atomicturtle - [PR 2162](https://github.com/ossec/ossec-hids/pull/2162) - Build fixes for Windows
65+
- @atomicturtle - [PR 2147](https://github.com/ossec/ossec-hids/pull/2147) - Add RPM spec file
66+
- @atomicturtle - [PR 2146](https://github.com/ossec/ossec-hids/pull/2146) - Handle SSL EOF condition in agent-auth
67+
68+
69+
70+
171
**OSSEC changelog (3.8.0) <scott@atomicorp.com>**
272

373
**Release Maintainers**

CONFIG

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
OSSEC v3.8.0
1+
OSSEC v4.0.0
22
Copyright (C) 2019 Trend Micro Inc.
33

44

INSTALL

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
OSSEC v3.8.0
1+
OSSEC v4.0.0
22
Copyright (C) 2019 Trend Micro Inc.
33

44

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
OSSEC v3.8.0 Copyright (C) 2019 Trend Micro Inc.
1+
OSSEC v4.0.0
22

33
# Information about OSSEC
44

ossec-hids.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
Summary: An Open Source Host-based Intrusion Detection System
2222
Name: ossec-hids
2323
Epoch: 1
24-
Version: 3.8.0
24+
Version: 4.0.0
2525
Release: RELEASE-AUTO%{?dist}.art
2626
License: GPL
2727
Group: Applications/System
@@ -767,6 +767,9 @@ fi
767767

768768
# Changes
769769
%changelog
770+
* Sat Feb 1 2026 Support <support@atomicorp.com> - 4.0.0-1
771+
- Update to 4.0.0
772+
770773
* Tue Jan 7 2025 Support <support@atomicorp.com> - 3.8.0-1
771774
- Update to 3.8.0
772775
- Added ossec service files for agent/server

src/VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v3.8.0
1+
v4.0.0

src/headers/defs.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939

4040
/* Some global names */
4141
#define __ossec_name "OSSEC HIDS"
42-
#define __ossec_version "v3.8.0"
42+
#define __ossec_version "v4.0.0"
4343
#define __author "OSSEC Foundation"
4444
#define __contact "contact@ossec.net"
4545
#define __site "https://www.ossec.net"

src/init/ossec-client.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ DIR=`dirname $PWD`;
1111

1212
### Do not modify below here ###
1313
NAME="OSSEC HIDS"
14-
VERSION="v3.8.0"
14+
VERSION="v4.0.0"
1515
DAEMONS="ossec-logcollector ossec-syscheckd ossec-agentd ossec-execd"
1616

1717
[ -f /etc/ossec-init.conf ] && . /etc/ossec-init.conf

src/init/ossec-local.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ if [ $? = 0 ]; then
1919
fi
2020

2121
NAME="OSSEC HIDS"
22-
VERSION="v3.8.0"
22+
VERSION="v4.0.0"
2323
DAEMONS="ossec-monitord ossec-logcollector ossec-syscheckd ossec-analysisd ossec-maild ossec-execd ${DB_DAEMON} ${CSYSLOG_DAEMON} ${AGENTLESS_DAEMON}"
2424

2525
## Locking for the start/stop

0 commit comments

Comments
 (0)