From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH] suricata: Update to 6.0.10 Date: Fri, 03 Feb 2023 17:13:21 +0100 Message-ID: <20230203161321.3487937-1-matthias.fischer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============9207150555113681764==" List-Id: --===============9207150555113681764== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable ""6.0.10 -- 2023-01-31 Security #5804: Suricata crashes while processing FTP (6.0.x backport) Bug #5815: detect: config keyword prevents tx cleanup (6.0.x backport) Bug #5812: nfs: debug validation triggered on nfs2 read Bug #5810: smb/ntlmssp: parser incorrectly assumes fixed field order (6.0.x b= ackport) Bug #5806: exceptions: midstream flows are dropped if midstream=3Dtrue && str= eam.midstream-policy=3Ddrop-flow (6.0.x backport) Bug #5796: TLS Handshake Fragments not Reassembled (6.0.x backport) Bug #5795: detect/udp: different detection from rules when UDP/TCP header is = broken (6.0.x backport) Bug #5793: decode: Padded packet to minimal Ethernet length marked with inval= id length event (6.0.x backport) Bug #5791: smb: unbounded file chunk queuing after gap (6.0.x backport) Bug #5763: libbpf: Use of legacy code in eBPF/XDP programs (6.0.x backport) Bug #5762: detect/pcre: JIT not disabled when OS doesn't allow RWX pages Bug #5760: nfs: ASSERT: attempt to subtract with overflow (compound) (6.0.x b= ackport) Bug #5749: iprep/ipv6: warning issued on valid reputation input (6.0.x backpo= rt) Bug #5744: netmap: 6.0.9 v14 backport causes known packet stalls from v14 imp= lementation in "legacy" mode too Bug #5738: smb: failed assertion (!((f->alproto =3D=3D ALPROTO_SMB && txd->fi= les_logged !=3D 0))), function CloseFile, file output-file.c (6.0.x backport) Bug #5735: smtp: quoted-printable encoding skips empty lines in files (6.0.x = backport) Bug #5723: eve: missing common fields like community id for some event types = like RFB Bug #5601: detect: invalid hex character in content leads to bad debug messag= e (6.0.x backport) Bug #5565: Excessive qsort/msort time when large number of rules using tls.fi= ngerprint (6.0.x backport) Bug #5299: YAML warning from default config on 6.0.5 Optimization #5797: tls: support incomplete API to replace internal buffering Optimization #5790: smb: set defaults for file chunk limits (6.0.x backport)" Signed-off-by: Matthias Fischer --- lfs/suricata | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/suricata b/lfs/suricata index 4f1887ee8..98710d9e2 100644 --- a/lfs/suricata +++ b/lfs/suricata @@ -1,7 +1,7 @@ ############################################################################= ### # = # # IPFire.org - A linux based firewall = # -# Copyright (C) 2007-2022 IPFire Team = # +# Copyright (C) 2007-2023 IPFire Team = # # = # # This program is free software: you can redistribute it and/or modify = # # it under the terms of the GNU General Public License as published by = # @@ -24,7 +24,7 @@ =20 include Config =20 -VER =3D 6.0.9 +VER =3D 6.0.10 =20 THISAPP =3D suricata-$(VER) DL_FILE =3D $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_BLAKE2 =3D 966657eeff216894f6357989f0317b7c5eed82602ca2381269446c= be4c015be449f5598726b2f58924f20aca30c4e130ecafe642ea4ce39f1671f46093292551 +$(DL_FILE)_BLAKE2 =3D a2b334c0139ead0b914ba6039c116ebad30dd3b5c0d4bb751f608a= f83e1487a67b96224ffe61635468dc49a9e44f03a76facf2af66582ba18e364f233029b532 =20 install : $(TARGET) =20 --=20 2.34.1 --===============9207150555113681764==--