544 lines
24 KiB
Plaintext
544 lines
24 KiB
Plaintext
-------------------------------------------------------------------
|
||
Tue Apr 22 14:37:23 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>
|
||
|
||
- Invert libhs inclusion condition to handle other architectures
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Jan 15 16:47:35 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>
|
||
|
||
- Added suricata-devel package
|
||
- Added libsuricata package
|
||
* Enable shared library build
|
||
|
||
- Use pkgconfig to find build dependencies
|
||
- Remove coccinelle build dependency
|
||
|
||
- Only build with XDP/eBPF support when available
|
||
- Only build with libmagic/libnet support when available
|
||
|
||
- Update to version 7.0.8:
|
||
* Various security, performance, accuracy, and stability issues
|
||
have been fixed.
|
||
* This release addresses CVE IDs:
|
||
~ CVE-2024-55627: CRITICAL
|
||
~ CVE-2024-55605: CRITICAL
|
||
~ CVE-2024-55629: HIGH
|
||
~ CVE-2024-55628: HIGH
|
||
~ CVE-2024-55626: LOW
|
||
|
||
- Update to version 7.0.7:
|
||
* LibHTP has been updated to version 0.5.49
|
||
* Various security, performance, accuracy, and stability issues
|
||
have been fixed.
|
||
* This release addresses CVE IDs:
|
||
~ CVE-2024-45797: CRITICAL
|
||
~ CVE-2024-47187: CRITICAL
|
||
~ CVE-2024-47188: CRITICAL
|
||
~ CVE-2024-47522: HIGH
|
||
~ CVE-2024-45795: HIGH
|
||
~ CVE-2024-45796: HIGH
|
||
|
||
- Update to version 7.0.6
|
||
* Various security, performance, accuracy, and stability issues
|
||
have been fixed.
|
||
* JA4 for TLS and QUIC has been backported to Suricata 7.0.6.
|
||
* These releases address CVE IDs:
|
||
~ CVE-2024-37151: CRITICAL
|
||
~ CVE-2024-38536: HIGH
|
||
~ CVE-2024-38534: HIGH
|
||
~ CVE-2024-38535: CRITICAL
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jul 15 17:54:13 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>
|
||
|
||
- Depend on vectorscan, as hyperscan has gone closed source
|
||
|
||
-------------------------------------------------------------------
|
||
Sat Jun 22 18:38:38 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>
|
||
|
||
- Update to version 7.0.5
|
||
* LibHTP has been updated to version 0.5.48. This version is
|
||
bundled with these new Suricata releases.
|
||
* Suricata-Update has been updated to 1.3.3 in Suricata 7.0.5.
|
||
* Various security, performance, accuracy, and stability issues
|
||
have been fixed.
|
||
https://redmine.openinfosecfoundation.org/versions/206
|
||
* These releases address CVE IDs:
|
||
~ CVE-2024-32663 - Critical severity
|
||
~ CVE-2024-32664 - High severity
|
||
~ CVE-2024-32867 - Moderate severity
|
||
|
||
- Update to version 7.0.4
|
||
* Various security, performance, accuracy, and stability issues
|
||
have been fixed.
|
||
https://redmine.openinfosecfoundation.org/versions/202
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Feb 19 07:26:30 UTC 2024 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 7.0.3
|
||
* LibHTP required version is 0.5.46. This is the version that is bundled
|
||
with the releases.
|
||
* Various security, performance, accuracy, and stability issues have been fixed.
|
||
https://redmine.openinfosecfoundation.org/versions/200
|
||
* These releases address CVE IDs:
|
||
- CVE-2024-23839 - Critical severity
|
||
- CVE-2024-23836 - Critical severity
|
||
- CVE-2024-23835 - High severity
|
||
- CVE-2024-24568 - Moderate severity
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Oct 19 17:24:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 7.0.2
|
||
* Various security, performance, accuracy, and stability issues have been fixed.
|
||
https://redmine.openinfosecfoundation.org/versions/198
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Sep 25 07:04:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 7.0.1
|
||
* LibHTP required version is 0.5.45. This is the version that is bundled
|
||
with the release.
|
||
* Various security, performance, accuracy, and stability issues have been
|
||
fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jul 27 08:44:46 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 7.0.0
|
||
* Main features:
|
||
- DPDK IDS/IPS 35 support for primary mode was added
|
||
- AF_XDP IDS 17support by Richard McConnell at Rapid7
|
||
- HTTP/HTTP2 new keywords for header inspection
|
||
- TLS: client certificate logging and detection
|
||
- Bittorrent parser by Aaron Bungay
|
||
- IPS: new default DROP behavior for exception policies 7
|
||
- EVE documented and validated with a json schema
|
||
- HTTP/2 support is no longer considered experimental
|
||
- NETMAP API 14
|
||
- Conditional PCAP 43 by Eric Leblond and Scott Jordan
|
||
- Initial libsuricata support
|
||
- VLAN support extended from 2 to 3 layers
|
||
* Performance improvements:
|
||
- file.data MPM split per app protocol
|
||
- New lighter rule profiling mode by Eric Leblond
|
||
- SMB: many fixes and optimizations
|
||
- Hash calculation using Rust crypto instead of NSS
|
||
- Flow manager tuning
|
||
- Many more performance-related counters
|
||
- Stream buffer, which is used by stream engine, file tracking, and more, is more memory efficient
|
||
* Secure Deployment / Security
|
||
- Linux Landlock support added by Eric Leblond
|
||
- Use of setrlimit to prevent Suricata from creating another process
|
||
- Lock cargo crates
|
||
- Default to secure settings for Datasets and Lua
|
||
- Maximum number of transactions for several protocols
|
||
- New Security Policies: https://github.com/OISF/suricata/blob/master/SECURITY.md 15
|
||
* Protocols
|
||
- QUICv1, GQUIC support added. GQUIC contributed by Emmanuel Thompson
|
||
- PostgreSQL support added
|
||
- HTTP/2 deflate decompression, byte-ranges support
|
||
- VN-Tag support
|
||
- Modbus rewritten to Rust with Eve logging added by Simon Dugas
|
||
- IKEv1 support added by Sascha Steinbiss and Frank Honza
|
||
- ESP flow tracking and logging
|
||
- Minimal telnet parser
|
||
- Active flow and TCP counters
|
||
- Network service header
|
||
- Remove dependency on system’s /etc/protocols
|
||
* Rules
|
||
- Added new rule keywords for DHCP, Kerberos, SNMP, TLS, QUIC
|
||
- JA3(s) support for QUIC
|
||
- New (experimental) class of keywords through “frames API”: NFS, SMB, DNS, telnet, SSL/TLS
|
||
- HTTP request files and NFS now support file.data
|
||
- “XOR” transform was added
|
||
- Lua: access to more rule info
|
||
- The byte_test, byte_math, and byte_jump keywords allow a variable name for the byte count value.
|
||
- flow.age keyword was added
|
||
* IPS
|
||
- Exception Policies added to better control packet handling in such conditions as memory caps being hit
|
||
- DPDK support
|
||
* Socket Control
|
||
- Get flow stats over Unix socket
|
||
- Datasets management commands were added
|
||
* Output
|
||
- Conditional packet capture allows packets to be written to disk only after an alert has been triggered
|
||
- New “stream” eve output type for debugging the stream engine
|
||
- Log engine verdict on rejected/dropped/passed packets
|
||
* Dev corner
|
||
- Total: 1375 files changed, 130027 insertions(+), 127626 deletions(-)
|
||
- Rust: 173 files changed, 39279 insertions(+), 13830 deletions(-)
|
||
- C: 978 files changed, 73882 insertions(+), 109446 deletions(-)
|
||
- Docs: 142 files changed, 6636 insertions(+), 1890 deletions(-)
|
||
- Much stricter C compiler flags.
|
||
- Clang’s scan-build clean, which is enforced in CI.
|
||
- CI was expanded.
|
||
- Rust parsers upgraded to using Nom 7
|
||
* Upgrade notes:
|
||
- Suricata 7.0 now uses pcre2 instead of pcre1.
|
||
- The MSRV (minimum supported Rust version) has been updated to 1.63.0 from 1.41.1 minimum in Suricata 6.0.
|
||
- Support for Prelude (libprelude) has been removed
|
||
- Suricata 7.0 requires and bundles libhtp 0.5.45
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 20 07:16:17 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 6.0.13
|
||
* LibHTP has been updated to 0.5.44. This is a required version that is
|
||
bundled with the release.
|
||
* Security #6119: datasets: absolute path in rules can overwrite arbitrary
|
||
files (6.0.x backport)
|
||
* Bug #6138: Decode-events of IPv6 packets are not triggered
|
||
(6.0.x backport)
|
||
* Bug #6136: suricata-update: dump-sample-configs: configuration files not
|
||
found (6.0.x backport)
|
||
* Bug #6125: http2: cpu overconsumption in rust moving/memcpy in
|
||
http2_parse_headers_blocks (6.0.x backport)
|
||
* Bug #6113: ips: txs still logged for dropped flow (6.0.x backport)
|
||
* Bug #6056: smtp: long line discard logic should be separate for server and
|
||
client (6.0.x backport)
|
||
* Bug #6055: ftp: long line discard logic should be separate for server and
|
||
client (6.0.x backport)
|
||
* Bug #5990: smtp: any command post a long command gets skipped
|
||
(6.0.x backport)
|
||
* Bug #5982: smtp: Long DATA line post boundary is capped at 4k Bytes
|
||
(6.0.x backport)
|
||
* Bug #5809: smb: convert transaction list to vecdeque (6.0.x backport)
|
||
* Bug #5604: counters: tcp.syn, tcp.synack, tcp.rst depend on flow
|
||
(6.0.x backport)
|
||
* Bug #5550: dns: allow dns messages with invalid opcodes (6.0.x backport)
|
||
* Task #5984: libhtp 0.5.44 (6.0.x backport)
|
||
* Documentation #6134: userguide: add instructions/explanation for
|
||
(not) running suricata with root (6.0.x backport)
|
||
* Documentation #6121: datasets: 6.0.x work-arounds for dataset supply chain
|
||
attacks
|
||
|
||
-------------------------------------------------------------------
|
||
Wed May 10 07:15:41 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 6.0.12
|
||
* Various performance, accuracy, and stability issues have been fixed.
|
||
* Remove legacy pfring install guide
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 21 12:28:37 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 6.0.11
|
||
* LibHTP has been updated to 0.5.43. This is a required version that is
|
||
bundled with the release.
|
||
* Various security, performance, accuracy, and stability issues have been
|
||
fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Feb 9 21:50:04 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 6.0.10
|
||
Various security, performance, accuracy, and stability issues have been fixed
|
||
https://forum.suricata.io/t/suricata-6-0-10-released/3175/2
|
||
* Security #5804: Suricata crashes while processing FTP (6.0.x backport)
|
||
* Bug #5815: detect: config keyword prevents tx cleanup (6.0.x backport)
|
||
* Bug #5812: nfs: debug validation triggered on nfs2 read
|
||
* Bug #5810: smb/ntlmssp: parser incorrectly assumes fixed field order
|
||
(6.0.x backport)
|
||
* Bug #5806: exceptions: midstream flows are dropped if
|
||
midstream=true && stream.midstream-policy=drop-flow (6.0.x backport)
|
||
* Bug #5796: TLS Handshake Fragments not Reassembled (6.0.x backport)
|
||
* Bug #5795: detect/udp: different detection from rules when UDP/TCP header is
|
||
broken (6.0.x backport)
|
||
* Bug #5793: decode: Padded packet to minimal Ethernet length marked with
|
||
invalid length event (6.0.x backport)
|
||
* Bug #5791: smb: unbounded file chunk queuing after gap (6.0.x backport)
|
||
* Bug #5763: libbpf: Use of legacy code in eBPF/XDP programs (6.0.x backport)
|
||
* Bug #5762: detect/pcre: JIT not disabled when OS doesn't allow RWX pages
|
||
* Bug #5760: nfs: ASSERT: attempt to subtract with overflow (compound)
|
||
(6.0.x backport)
|
||
* Bug #5749: iprep/ipv6: warning issued on valid reputation input
|
||
(6.0.x backport)
|
||
* Bug #5744: netmap: 6.0.9 v14 backport causes known packet stalls from v14
|
||
implementation in "legacy" mode too
|
||
* Bug #5738: smb: failed assertion
|
||
(!((f->alproto == ALPROTO_SMB && txd->files_logged != 0))),
|
||
function CloseFile, file output-file.c (6.0.x backport)
|
||
* Bug #5735: smtp: quoted-printable encoding skips empty lines in files
|
||
(6.0.x backport)
|
||
* Bug #5723: eve: missing common fields like community id for some event types
|
||
like RFB
|
||
* Bug #5601: detect: invalid hex character in content leads to bad debug
|
||
message (6.0.x backport)
|
||
* Bug #5565: Excessive qsort/msort time when large number of rules using
|
||
tls.fingerprint (6.0.x backport)
|
||
* Bug #5299: YAML warning from default config on 6.0.5
|
||
* Optimization #5797: tls: support incomplete API to replace internal buffering
|
||
* Optimization #5790: smb: set defaults for file chunk limits (6.0.x backport)
|
||
- add dependency libhtp >= 0.5.42
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 29 18:46:25 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||
|
||
- Update to version 6.0.9
|
||
Various security, performance, accuracy and stability issues have been fixed
|
||
https://forum.suricata.io/t/suricata-6-0-9-released/3012
|
||
- build now requires libhtp >= 0.5.42
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Oct 3 11:41:34 UTC 2022 - Martin Hauke <mardnh@gmx.de>
|
||
|
||
- Use hyperscan-devel instead of 'pkgconfig(libhs)' to prevent:
|
||
"unresolvable: have choice for pkgconfig(libhs): hyperscan-devel
|
||
vectorscan-devel"
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Sep 28 08:06:06 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||
|
||
- Update to version 6.0.8
|
||
https://forum.suricata.io/t/suricata-6-0-8-released/2808
|
||
https://forum.suricata.io/t/suricata-6-0-7-released/2807
|
||
https://forum.suricata.io/t/suricata-6-0-6-and-5-0-10-released/2637
|
||
- build now requires libhtp >= 0.5.41
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 28 12:13:10 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Copy config files and update rules
|
||
- Add python3-PyYAML as dependency for suricata-update
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 28 11:58:29 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>
|
||
|
||
- Update to version 6.0.5
|
||
https://forum.suricata.io/t/suricata-6-0-5-and-5-0-9-released/2415
|
||
- LibHTP has been updated to 0.5.40. This is a required version that
|
||
is bundled with both releases.
|
||
- Suricata-Update, as bundled with 6.0.5, was updated to 1.2.4.
|
||
- Various security, performance, accuracy and stability issues have
|
||
been fixed.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jan 25 15:09:22 UTC 2022 - Hans-Peter Jansen <hpj@urpla.net>
|
||
|
||
- Update to version 6.0.4:
|
||
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
|
||
- Add luajit build conditional
|
||
- More man pages
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Nov 9 11:56:06 UTC 2020 - Hans-Peter Jansen <hpj@urpla.net>
|
||
|
||
- Update to version 6.0.0:
|
||
https://suricata-ids.org/2020/10/08/suricata-6-0-0-released/
|
||
Upgrade notes:
|
||
https://suricata.readthedocs.io/en/latest/upgrade.html
|
||
- Add new dependencies, most notably: rust, cargo
|
||
- Change geoip to maxminddb:
|
||
https://build.opensuse.org/package/view_file/openSUSE:Leap:15.2/GeoIP/README.SUSE
|
||
- Disable prelude support: currently broken
|
||
https://redmine.openinfosecfoundation.org/issues/4065
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Apr 28 17:51:33 UTC 2020 - Martin Hauke <mardnh@gmx.de>
|
||
|
||
- Switch to python3
|
||
- Update to version 4.1.8
|
||
* Bug #3492: Backport 4 BUG_ON(strcasecmp(str, “any”) in
|
||
DetectAddressParseString
|
||
* Bug #3508: rule parsing: memory leaks
|
||
* Bug #3527: 4.1.x Kerberos vulnerable to TCP splitting evasion
|
||
* Bug #3533: Skip over ERF_TYPE_META records
|
||
* Bug #3551: file logging: complete files sometimes marked
|
||
‘TRUNCATED’
|
||
* Bug #3572: rust: smb compile warnings
|
||
* Bug #3579: Faulty signature with two threshold keywords does
|
||
not generate an error and never match
|
||
* Bug #3581: random failures on sip and http-evader
|
||
suricata-verify tests
|
||
* Bug #3596: ftp: asan detects leaks of expectations
|
||
* Bug #3599: rules: memory leaks in pktvar keyword
|
||
* Bug #3601: rules: bad address block leads to stack exhaustion
|
||
* Bug #3603: rules: crash on ‘internal’-only keywords
|
||
* Bug #3605: rules: missing ‘consumption’ of transforms
|
||
before pkt_data would lead to crash
|
||
* Bug #3607: rules: minor memory leak involving
|
||
pcre_get_substring
|
||
* Bug #3608: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
|
||
* Bug #3611: defrag: asan issue
|
||
* Bug #3633: file-store.stream-depth not working as expected
|
||
when configured to a specfic value (4.1.x)
|
||
* Bug #3645: Invalid memory read on malformed rule with Lua
|
||
script
|
||
* Bug #3647: rules: memory leaks on failed rules
|
||
* Bug #3648: CIDR Parsing Issue
|
||
* Bug #3650: FTP response buffering against TCP stream
|
||
* Bug #3652: Recursion stack-overflow in parsing YAML
|
||
configuration
|
||
* Bug #3659: Multiple DetectEngineReload and bad insertion
|
||
into linked list lead to buffer overflow
|
||
* Bug #3666: FTP: Incorrect ftp_memuse calculation.
|
||
* Bug #3668: Signature with an IP range creates one
|
||
IPOnlyCIDRItem by signe IP address
|
||
* Bug #3671: Protocol detection evasion by packet splitting
|
||
* Bug #3676: Segfault on SMTP TLS
|
||
* Feature #3482: GRE ERSPAN Type 1 Support
|
||
* Task #3479: libhtp 0.5.33 (4.1.x)
|
||
* Task #3513: SMTP should place restraints on variable length
|
||
items (e.g., filenames)
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Feb 19 20:27:13 UTC 2020 - Martin Hauke <mardnh@gmx.de>
|
||
|
||
- Update to 4.1.7
|
||
* Bug #3417: –disable-geoip does not work
|
||
* Bug #3448: Suricata 4.1 Seg Fault: Socket Control pcap-file
|
||
and corrupt pcap
|
||
* Bug #3452: smb: post-GAP file tx handling
|
||
* Bug #3453: coverity: CID 1456680: Incorrect expression
|
||
(IDENTICAL_BRANCHES)
|
||
* Bug #3470: gcc10: compilation failure unless -fcommon is
|
||
supplied
|
||
* Bug #3471: nfs: post-GAP some transactions never close
|
||
* Bug #3472: nfs: post-GAP file tx handling
|
||
* Bug #3474: Dropping privileges does not work with NFLOG
|
||
- Update to 4.1.6
|
||
* Bug #3276: address parsing: memory leak in error path
|
||
* Bug #3278: segfault when test a nfs pcap file
|
||
* Bug #3279: ikev2 enabled in config even if Rust is disabled
|
||
* Bug #3325: lua issues on arm (fedora:29)
|
||
* Bug #3326: Static build with pcap fails
|
||
* Bug #3327: tcp: empty SACK option leads to decoder event
|
||
* Bug #3347: BPF filter on command line not honored for pcap
|
||
file
|
||
* Bug #3355: DNS: DNS over TCP transactions logged with wrong
|
||
direction.
|
||
* Bug #3356: DHCP: Slow down over time due to lack of detect
|
||
flags
|
||
* Bug #3369: byte_extract does not work in some situations
|
||
* Bug #3385: fast-log: icmp type prints wrong value
|
||
* Bug #3387: suricata is logging tls log repeatedly if custom
|
||
mode is enabled
|
||
* Bug #3388: TLS Lua output does not work without TLS log
|
||
* Bug #3391: Suricata is unable to get MTU from NIC after
|
||
* Bug #3393: http: pipelining tx id handling broken
|
||
* Bug #3394: TCP evasion technique by overlapping a TCP segment
|
||
with a fake packet
|
||
* Bug #3395: TCP evasion technique by faking a closed TCP sessionl
|
||
* Bug #3402: smb: post-GAP some transactions never close
|
||
* Bug #3403: smb1: ‘event only’ transactions for bad requests
|
||
never close
|
||
* Bug #3404: smtp: file tracking issues when more than one
|
||
attachment in a tx
|
||
* Bug #3405: Filehash rule does not fire without filestore
|
||
keyword
|
||
* Bug #3410: intermittent abort()s at shutdown and in unix-socket
|
||
* Bug #3412: detect/asn1: crashes on packets smaller than offset
|
||
setting
|
||
* Task #3367: configure: Rust 1.37+ has cargo-vendor support
|
||
bundled into cargo
|
||
* Bundle Suricata-Update 1.0.6
|
||
* Bundle Libhtp 0.5.32
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Oct 22 09:24:31 UTC 2019 - Lars Vogdt <lars@linux-schulserver.de>
|
||
|
||
- Update to 4.1.5
|
||
* Feature #3068: protocol parser: vxlan (4.1.x)
|
||
* Bug #2841: False positive alerts firing after upgrade suricata 3.0 -> 4.1.0 (4.1.x)
|
||
* Bug #2966: filestore (v1 and v2): dropping of “unwanted” files (4.1.x)
|
||
* Bug #3008: rust: updated libc crate causes depration warnings (4.1.x)
|
||
* Bug #3044: tftp: missing logs because of broken tx handling (4.1.x)
|
||
* Bug #3067: GeoIP keyword depends on now discontinued legacy GeoIP database (4.1.x)
|
||
* Bug #3094: Fedora rawhide af-packet compilation err (4.1.x)
|
||
* Bug #3123: bypass keyword: Suricata 4.1.x Segmentation Faults (4.1.x)
|
||
* Bug #3129: Fixes warning about size of integers in string formats (4.1.x)
|
||
* Bug #3159: SC_ERR_PCAP_DISPATCH with message “error code -2” upon rule reload completion (4.1.x)
|
||
* Bug #3164: Suricata 4.1.4: NSS Shutdown triggers crashes in test mode
|
||
* Bug #3168: tls: out of bounds read
|
||
* Bug #3170: defrag: out of bounds read
|
||
* Bug #3173: ipv4: ts field decoding oob read
|
||
* Bug #3175: File_data inspection depth while inspecting base64 decoded data (4.1.x)
|
||
* Bug #3184: decode/der: crafted input can lead to resource starvation
|
||
* Bug #3186: Multiple Content-Length headers causes HTP_STREAM_ERROR (4.1.x)
|
||
* Bug #3187: GET/POST HTTP-request with no Content-Length, http_client_body miss (4.1.x)
|
||
- build with lz4 and lzma support, especially to enable compression
|
||
- require python-yaml during build, which results in suricate-update
|
||
get's build and installed. This allows to update local
|
||
Suricata rules
|
||
- package /var/log/suricata directory instead of creating it during
|
||
post-installation of the package
|
||
|
||
-------------------------------------------------------------------
|
||
Tue May 14 09:35:39 UTC 2019 - Robert Frohl <rfrohl@suse.com>
|
||
|
||
- Update to version 4.1.4
|
||
* CVE-2019-10053: ssh: heap buffer overflow (boo#1134993)
|
||
* CVE-2019-10050: mpls: heapbuffer overflow in file decode-mpls.c (boo#1134991)
|
||
* decode-ethernet: heapbuffer overflow in file decode-ethernet.c
|
||
* smb 1 create andx request does not parse the filename correctly
|
||
* rust/dhcp: panic in dhcp parser
|
||
* mpls: cast of misaligned data leads to undefined behavior
|
||
* rust/ftp: panic in ftp parser
|
||
* rust/nfs: integer underflow
|
||
* This release includes Suricata-Update 1.0.5
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Mar 7 21:31:14 UTC 2019 - Martin Hauke <mardnh@gmx.de>
|
||
|
||
- Update to version 4.0.7
|
||
* Failed Assertion, Suricata Abort - util-mpm-hs.c line 163
|
||
* unix runmode deadlock when using too many threads
|
||
* rule reload with workers mode and NFQUEUE not working stable
|
||
* TCP FIN/ACK, RST/ACK in HTTP - detection bypass
|
||
* afpacket doesn't wait for all capture threads to start
|
||
* DNS Golden Transaction ID - detection bypass
|
||
* Invalid detect-engine config could lead to segfault
|
||
* suricata.c ConfigGetCaptureValue - PCAP/AFP fallthrough to
|
||
strip_trailing_plus
|
||
* Stats interval are 1 second too early each tick
|
||
* rust/dns/lua - The Lua calls for DNS values when using Rust
|
||
don't behave the same as the C implementation.
|
||
* out of bounds read in detection
|
||
* smtp: improve pipelining support
|
||
|
||
-------------------------------------------------------------------
|
||
Sun Dec 16 19:44:13 UTC 2018 - mardnh@gmx.de
|
||
|
||
- Use pkg-config style build dependencies
|
||
- Build with support for Hyperscan
|
||
- Add systemd service file
|
||
- Add logrotate configuration file
|
||
- Update to version 4.0.6
|
||
* smtp segmentation fault (4.0.x)
|
||
* negated fileext and filename do not work as expected (4.0.x)
|
||
* filemd5 is not fired in some cases when there are invalid packets
|
||
* File descriptor leak in af-packet mode (4.0.x)
|
||
* Improve errors handling in AF_PACKET (4.0.x)
|
||
* Support http events - Weird unicode characters and truncation in
|
||
some of http_method/http_user_agent fields.
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jul 24 11:52:06 UTC 2018 - kbabioch@suse.com
|
||
|
||
- Applied spec-cleaner
|
||
- Removed gpg-offline, since we have GPG source validation by default now
|
||
- Update to 4.0.5
|
||
- Bug fixes
|
||
- Private Suricata stops inspecting TCP stream if a TCP RST was met (4.0.x)
|
||
(CVE-2018-14568 bsc#1102334)
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Oct 4 23:06:57 UTC 2016 - Greg.Freemyer@gmail.com
|
||
|
||
- update to v3.1.2
|
||
- Fixed an issue with the handling of ICMPv4 error packets (CVE-2016-10728 bsc#1102402)
|
||
- build with libprelude suppport
|
||
- use libnetfilter_queue, libnfnetlink from the Factory repo instead of 5 year old versions
|
||
- use libhtp from server:monitoring
|
||
- run through spec-cleaner
|
||
- Still don't have man pages or user manual in the RPM
|
||
- http://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide
|
||
- change license to GPL-2.0
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Feb 12 08:28:27 UTC 2016 - christoph@stop.pe
|
||
|
||
- Initial release
|