From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: Re: [PATCH] suricata: Update to 6.0.10 Date: Sun, 05 Feb 2023 15:44:22 +0100 Message-ID: In-Reply-To: <20230203161321.3487937-1-matthias.fischer@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2662511263431199681==" List-Id: --===============2662511263431199681== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Reviewed-by: Adolf Belka On 03/02/2023 17:13, Matthias Fischer wrote: > ""6.0.10 -- 2023-01-31 > > Security #5804: Suricata crashes while processing FTP (6.0.x backport) > Bug #5815: detect: config keyword prevents tx cleanup (6.0.x backport) > Bug #5812: nfs: debug validation triggered on nfs2 read > Bug #5810: smb/ntlmssp: parser incorrectly assumes fixed field order (6.0.x= backport) > Bug #5806: exceptions: midstream flows are dropped if midstream=3Dtrue && s= tream.midstream-policy=3Ddrop-flow (6.0.x backport) > Bug #5796: TLS Handshake Fragments not Reassembled (6.0.x backport) > Bug #5795: detect/udp: different detection from rules when UDP/TCP header i= s broken (6.0.x backport) > Bug #5793: decode: Padded packet to minimal Ethernet length marked with inv= alid length event (6.0.x backport) > Bug #5791: smb: unbounded file chunk queuing after gap (6.0.x backport) > Bug #5763: libbpf: Use of legacy code in eBPF/XDP programs (6.0.x backport) > Bug #5762: detect/pcre: JIT not disabled when OS doesn't allow RWX pages > Bug #5760: nfs: ASSERT: attempt to subtract with overflow (compound) (6.0.x= backport) > Bug #5749: iprep/ipv6: warning issued on valid reputation input (6.0.x back= port) > Bug #5744: netmap: 6.0.9 v14 backport causes known packet stalls from v14 i= mplementation in "legacy" mode too > Bug #5738: smb: failed assertion (!((f->alproto =3D=3D ALPROTO_SMB && txd->= files_logged !=3D 0))), function CloseFile, file output-file.c (6.0.x backpor= t) > Bug #5735: smtp: quoted-printable encoding skips empty lines in files (6.0.= x backport) > Bug #5723: eve: missing common fields like community id for some event type= s like RFB > Bug #5601: detect: invalid hex character in content leads to bad debug mess= age (6.0.x backport) > Bug #5565: Excessive qsort/msort time when large number of rules using tls.= fingerprint (6.0.x backport) > Bug #5299: YAML warning from default config on 6.0.5 > Optimization #5797: tls: support incomplete API to replace internal bufferi= ng > Optimization #5790: smb: set defaults for file chunk limits (6.0.x backport= )" > > Signed-off-by: Matthias Fischer > --- > lfs/suricata | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/lfs/suricata b/lfs/suricata > index 4f1887ee8..98710d9e2 100644 > --- a/lfs/suricata > +++ b/lfs/suricata > @@ -1,7 +1,7 @@ > #########################################################################= ###### > # = # > # IPFire.org - A linux based firewall = # > -# Copyright (C) 2007-2022 IPFire Team = # > +# Copyright (C) 2007-2023 IPFire Team = # > # = # > # This program is free software: you can redistribute it and/or modify = # > # it under the terms of the GNU General Public License as published by = # > @@ -24,7 +24,7 @@ > =20 > include Config > =20 > -VER =3D 6.0.9 > +VER =3D 6.0.10 > =20 > THISAPP =3D suricata-$(VER) > DL_FILE =3D $(THISAPP).tar.gz > @@ -40,7 +40,7 @@ objects =3D $(DL_FILE) > =20 > $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) > =20 > -$(DL_FILE)_BLAKE2 =3D 966657eeff216894f6357989f0317b7c5eed82602ca238126944= 6cbe4c015be449f5598726b2f58924f20aca30c4e130ecafe642ea4ce39f1671f46093292551 > +$(DL_FILE)_BLAKE2 =3D a2b334c0139ead0b914ba6039c116ebad30dd3b5c0d4bb751f60= 8af83e1487a67b96224ffe61635468dc49a9e44f03a76facf2af66582ba18e364f233029b532 > =20 > install : $(TARGET) > =20 --===============2662511263431199681==--