Message ID | 20211120124732.30431-1-matthias.fischer@ipfire.org |
---|---|
State | Accepted |
Commit | 58d399710b5cf73f15e5ea6b7cd34717cc5f0a45 |
Headers |
Return-Path: <development-bounces@lists.ipfire.org> Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4HxCxC2cNsz3wcw for <patchwork@web04.haj.ipfire.org>; Sat, 20 Nov 2021 12:47:43 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4HxCxB0Q0Fz152; Sat, 20 Nov 2021 12:47:42 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4HxCx96kvzz2ydg; Sat, 20 Nov 2021 12:47:41 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4HxCx8688Yz2xd0 for <development@lists.ipfire.org>; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4HxCx80wsrz25 for <development@lists.ipfire.org>; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=tbilui6WdvSo1zwdTmb+AeLSjp4AErzv7Bep4fV6B84=; b=HLGYvmyhck/0c2mzuzNvueKOahw1ZAoyvxHGaF37uAhZaX0o+w3UlqTCLO57eCQUP2ml/G L2asJ00dktwDv3zzcGjHAjI6zAk4+yZJrKytWtYZ9xGz27eyFakYJsubUI7XgrVGpL1qad z5QCoquN1bvlEQCXbCBlLacy1IvwxtlIVe/CybcCyirKTC9+1keiMW6n/axiQ6tLtsuVvo pgsXH6DwOwhKq/FhL4Myr4peW64DuxJU1XLb3PU8zILIjPbFblNPnHjW+ABLzU6xciNxa+ je3iwvHs7t9Lg5lx67Ecq6pNHRgSvYlh/mLUD5r4UoWgfWubmsmJSffaVCJHTw== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=tbilui6WdvSo1zwdTmb+AeLSjp4AErzv7Bep4fV6B84=; b=z/gpf3ID2f2G+SMG/OxuVXc+y4aCoU5bWgbEL6ccc5YZFWtCrOCtOgPTi/Vd6L9wN0jJ+3 yOZepP+VzqvZVOCQ== From: Matthias Fischer <matthias.fischer@ipfire.org> To: development@lists.ipfire.org Subject: [PATCH 1/2] suricata: Update to 5.0.8 Date: Sat, 20 Nov 2021 13:47:31 +0100 Message-Id: <20211120124732.30431-1-matthias.fischer@ipfire.org> X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk <development.lists.ipfire.org> List-Unsubscribe: <https://lists.ipfire.org/mailman/options/development>, <mailto:development-request@lists.ipfire.org?subject=unsubscribe> List-Archive: <http://lists.ipfire.org/pipermail/development/> List-Post: <mailto:development@lists.ipfire.org> List-Help: <mailto:development-request@lists.ipfire.org?subject=help> List-Subscribe: <https://lists.ipfire.org/mailman/listinfo/development>, <mailto:development-request@lists.ipfire.org?subject=subscribe> Errors-To: development-bounces@lists.ipfire.org Sender: "Development" <development-bounces@lists.ipfire.org> |
Series |
[1/2] suricata: Update to 5.0.8
|
|
Commit Message
Matthias Fischer
20 Nov 2021, 12:47 p.m. UTC
For details see:
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
"Various security, performance, accuracy and stability issues have been fixed,
including two TCP evasion issues. CVE 2021-37592 was assigned."
Changelog:
"5.0.8 -- 2021-11-16
Security #4635: tcp: crafted injected packets cause desync after 3whs
Security #4727: Bypass of Payload Detection on TCP RST with options of MD5header
Bug #4345: Failed assert in TCPProtoDetectCheckBailConditions size_ts > 1000000UL
Bug #4382: fileinfo "stored: false" even if the file is kept on disk
Bug #4626: DNP3: intra structure overflow in DNP3DecodeObjectG70V6
Bug #4628: alert count shows up as 0 when stats are disabled
Bug #4631: Protocol detection : confusion with SMB in midstream
Bug #4639: Failed assertion in SMTP SMTPTransactionComplete
Bug #4646: TCP reassembly, failed assert app_progress > last_ack_abs, both sides need to be pruned
Bug #4647: rules: Unable to find the sm in any of the sm lists
Bug #4674: rules: mix of drop and pass rules issues
Bug #4676: rules: drop rules with noalert not fully dropping
Bug #4688: detect: too many prefilter engines lead to FNs
Bug #4690: nfs: failed assert self.tx_data.files_logged > 1
Bug #4691: IPv6 : decoder event on invalid fragment length
Bug #4696: lua: file info callback returns wrong value
Bug #4718: protodetect: SEGV due to NULL ptr deref
Bug #4729: ipv6 evasions : fragmentation
Bug #4788: Memory leak in SNMP with DetectEngineState
Bug #4790: af-packet: threads sometimes get stuck in capture
Bug #4794: loopback: different AF_INET6 values per OS
Bug #4816: flow-manager: cond_t handling in emergency mode is broken
Bug #4831: SWF decompression overread
Bug #4833: Wrong list_id with transforms for http_client_body and http file_data
Optimization #3429: improve err msg for dataset rules parsing
Task #4835: libhtp 0.5.39"
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
---
lfs/suricata | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Comments
Hello Matthias, This perfectly compliments my suricata patchset from yesterday :) Reviewed-by: Michael Tremer <michael.tremer@ipfire.org> -Michael > On 20 Nov 2021, at 12:47, Matthias Fischer <matthias.fischer@ipfire.org> wrote: > > For details see: > https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 > > "Various security, performance, accuracy and stability issues have been fixed, > including two TCP evasion issues. CVE 2021-37592 was assigned." > > Changelog: > > "5.0.8 -- 2021-11-16 > > Security #4635: tcp: crafted injected packets cause desync after 3whs > Security #4727: Bypass of Payload Detection on TCP RST with options of MD5header > Bug #4345: Failed assert in TCPProtoDetectCheckBailConditions size_ts > 1000000UL > Bug #4382: fileinfo "stored: false" even if the file is kept on disk > Bug #4626: DNP3: intra structure overflow in DNP3DecodeObjectG70V6 > Bug #4628: alert count shows up as 0 when stats are disabled > Bug #4631: Protocol detection : confusion with SMB in midstream > Bug #4639: Failed assertion in SMTP SMTPTransactionComplete > Bug #4646: TCP reassembly, failed assert app_progress > last_ack_abs, both sides need to be pruned > Bug #4647: rules: Unable to find the sm in any of the sm lists > Bug #4674: rules: mix of drop and pass rules issues > Bug #4676: rules: drop rules with noalert not fully dropping > Bug #4688: detect: too many prefilter engines lead to FNs > Bug #4690: nfs: failed assert self.tx_data.files_logged > 1 > Bug #4691: IPv6 : decoder event on invalid fragment length > Bug #4696: lua: file info callback returns wrong value > Bug #4718: protodetect: SEGV due to NULL ptr deref > Bug #4729: ipv6 evasions : fragmentation > Bug #4788: Memory leak in SNMP with DetectEngineState > Bug #4790: af-packet: threads sometimes get stuck in capture > Bug #4794: loopback: different AF_INET6 values per OS > Bug #4816: flow-manager: cond_t handling in emergency mode is broken > Bug #4831: SWF decompression overread > Bug #4833: Wrong list_id with transforms for http_client_body and http file_data > Optimization #3429: improve err msg for dataset rules parsing > Task #4835: libhtp 0.5.39" > > Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org> > --- > lfs/suricata | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/lfs/suricata b/lfs/suricata > index c7f189bf4..700556dd2 100644 > --- a/lfs/suricata > +++ b/lfs/suricata > @@ -24,7 +24,7 @@ > > include Config > > -VER = 5.0.7 > +VER = 5.0.8 > > THISAPP = suricata-$(VER) > DL_FILE = $(THISAPP).tar.gz > @@ -41,7 +41,7 @@ objects = $(DL_FILE) > > $(DL_FILE) = $(DL_FROM)/$(DL_FILE) > > -$(DL_FILE)_MD5 = f6ff77e4dcf8035853209ceeba9b530c > +$(DL_FILE)_MD5 = d48387c2e0b5e502852b077369d947c5 > > install : $(TARGET) > > -- > 2.18.0 >
On 20.11.2021 13:53, Michael Tremer wrote: > Hello Matthias, > > This perfectly compliments my suricata patchset from yesterday :) > > Reviewed-by: Michael Tremer <michael.tremer@ipfire.org> > ... I hoped it would. ;-) BTW: I also tested 6.0.4, but this version still has problems with cpu load, so I sticked with 5.0.8. Best, Matthias
diff --git a/lfs/suricata b/lfs/suricata index c7f189bf4..700556dd2 100644 --- a/lfs/suricata +++ b/lfs/suricata @@ -24,7 +24,7 @@ include Config -VER = 5.0.7 +VER = 5.0.8 THISAPP = suricata-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -41,7 +41,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = f6ff77e4dcf8035853209ceeba9b530c +$(DL_FILE)_MD5 = d48387c2e0b5e502852b077369d947c5 install : $(TARGET)