From patchwork Sat Nov 20 12:47:31 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthias Fischer X-Patchwork-Id: 4850 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4HxCxC2cNsz3wcw for ; Sat, 20 Nov 2021 12:47:43 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4HxCxB0Q0Fz152; Sat, 20 Nov 2021 12:47:42 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4HxCx96kvzz2ydg; Sat, 20 Nov 2021 12:47:41 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4HxCx8688Yz2xd0 for ; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4HxCx80wsrz25 for ; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=tbilui6WdvSo1zwdTmb+AeLSjp4AErzv7Bep4fV6B84=; b=HLGYvmyhck/0c2mzuzNvueKOahw1ZAoyvxHGaF37uAhZaX0o+w3UlqTCLO57eCQUP2ml/G L2asJ00dktwDv3zzcGjHAjI6zAk4+yZJrKytWtYZ9xGz27eyFakYJsubUI7XgrVGpL1qad z5QCoquN1bvlEQCXbCBlLacy1IvwxtlIVe/CybcCyirKTC9+1keiMW6n/axiQ6tLtsuVvo pgsXH6DwOwhKq/FhL4Myr4peW64DuxJU1XLb3PU8zILIjPbFblNPnHjW+ABLzU6xciNxa+ je3iwvHs7t9Lg5lx67Ecq6pNHRgSvYlh/mLUD5r4UoWgfWubmsmJSffaVCJHTw== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc; bh=tbilui6WdvSo1zwdTmb+AeLSjp4AErzv7Bep4fV6B84=; b=z/gpf3ID2f2G+SMG/OxuVXc+y4aCoU5bWgbEL6ccc5YZFWtCrOCtOgPTi/Vd6L9wN0jJ+3 yOZepP+VzqvZVOCQ== From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH 1/2] suricata: Update to 5.0.8 Date: Sat, 20 Nov 2021 13:47:31 +0100 Message-Id: <20211120124732.30431-1-matthias.fischer@ipfire.org> X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" For details see: https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 "Various security, performance, accuracy and stability issues have been fixed, including two TCP evasion issues. CVE 2021-37592 was assigned." Changelog: "5.0.8 -- 2021-11-16 Security #4635: tcp: crafted injected packets cause desync after 3whs Security #4727: Bypass of Payload Detection on TCP RST with options of MD5header Bug #4345: Failed assert in TCPProtoDetectCheckBailConditions size_ts > 1000000UL Bug #4382: fileinfo "stored: false" even if the file is kept on disk Bug #4626: DNP3: intra structure overflow in DNP3DecodeObjectG70V6 Bug #4628: alert count shows up as 0 when stats are disabled Bug #4631: Protocol detection : confusion with SMB in midstream Bug #4639: Failed assertion in SMTP SMTPTransactionComplete Bug #4646: TCP reassembly, failed assert app_progress > last_ack_abs, both sides need to be pruned Bug #4647: rules: Unable to find the sm in any of the sm lists Bug #4674: rules: mix of drop and pass rules issues Bug #4676: rules: drop rules with noalert not fully dropping Bug #4688: detect: too many prefilter engines lead to FNs Bug #4690: nfs: failed assert self.tx_data.files_logged > 1 Bug #4691: IPv6 : decoder event on invalid fragment length Bug #4696: lua: file info callback returns wrong value Bug #4718: protodetect: SEGV due to NULL ptr deref Bug #4729: ipv6 evasions : fragmentation Bug #4788: Memory leak in SNMP with DetectEngineState Bug #4790: af-packet: threads sometimes get stuck in capture Bug #4794: loopback: different AF_INET6 values per OS Bug #4816: flow-manager: cond_t handling in emergency mode is broken Bug #4831: SWF decompression overread Bug #4833: Wrong list_id with transforms for http_client_body and http file_data Optimization #3429: improve err msg for dataset rules parsing Task #4835: libhtp 0.5.39" Signed-off-by: Matthias Fischer Reviewed-by: Michael Tremer --- lfs/suricata | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lfs/suricata b/lfs/suricata index c7f189bf4..700556dd2 100644 --- a/lfs/suricata +++ b/lfs/suricata @@ -24,7 +24,7 @@ include Config -VER = 5.0.7 +VER = 5.0.8 THISAPP = suricata-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -41,7 +41,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = f6ff77e4dcf8035853209ceeba9b530c +$(DL_FILE)_MD5 = d48387c2e0b5e502852b077369d947c5 install : $(TARGET) From patchwork Sat Nov 20 12:47:32 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthias Fischer X-Patchwork-Id: 4851 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4HxCxD3Vznz3wsk for ; Sat, 20 Nov 2021 12:47:44 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4HxCxB1XCBz23L; Sat, 20 Nov 2021 12:47:42 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4HxCxB0HfNz2ytv; Sat, 20 Nov 2021 12:47:42 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4HxCx874Mvz2yJG for ; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4HxCx85ddGz152 for ; Sat, 20 Nov 2021 12:47:40 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:in-reply-to:in-reply-to:references:references; bh=pPq+OswGl++iJAtFB9uN7jelzDKgyIp95EmbairHQ8o=; b=SwmqZx0YoC1OupqCHMHfgtI12JbiSpfamrKtmteFXfTuqPmpSqy9KPfLdfChOExtjZK0qw SoJUzcZ/t7150oCw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1637412460; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:in-reply-to:in-reply-to:references:references; bh=pPq+OswGl++iJAtFB9uN7jelzDKgyIp95EmbairHQ8o=; b=nqZ2RIRIsLGPpx6z68Qx6H6/SiehyLWqQn1aw84i/5v5HpZSEY9uqYH5BpQQ3ZWOQ2Raob LkFWuS4ioohLgWj0Q39YY//bjsSADnI9kRvzieyqto7QlTj1D5KibBSzVAAm9yAjidZuUf GYdvlpZNDkjzcBqENH4Zc9HiFJgyyUIcEeXKF1KnnkUEvT7jh5FmNP+0snYCh6+++ohuKA 1ma8ReZlv8NjtLhZS0SU+6o4Wt+mEiUrRnkUKoe2Z0DIZ2oQYzLOOinNIrWjS4oJzV2c2u tu1bkO5sUyf4GC4tGrmcWJjSA6sRRRZsBJADBXt8eVWDBKla2r2gWwzvG+PGXw== From: Matthias Fischer To: development@lists.ipfire.org Subject: [PATCH 2/2] libhtp: Update to 0.5.39 Date: Sat, 20 Nov 2021 13:47:32 +0100 Message-Id: <20211120124732.30431-2-matthias.fischer@ipfire.org> In-Reply-To: <20211120124732.30431-1-matthias.fischer@ipfire.org> References: <20211120124732.30431-1-matthias.fischer@ipfire.org> X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" For details see: https://github.com/OISF/libhtp/releases/tag/0.5.39 "0.5.39 (16 Nov 2021) -------------------- - host: ipv6 address is a valid host - util: one char is not always empty line - test and fuzz improvements" Signed-off-by: Matthias Fischer Reviewed-by: Michael Tremer --- lfs/libhtp | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lfs/libhtp b/lfs/libhtp index 242953254..95264df09 100644 --- a/lfs/libhtp +++ b/lfs/libhtp @@ -24,7 +24,7 @@ include Config -VER = 0.5.38 +VER = 0.5.39 THISAPP = libhtp-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 4d3bee196a8adcb10bfd874ec6bd9ca0 +$(DL_FILE)_MD5 = f18e1a3f36b97beb63616ad1a5c2a9d8 install : $(TARGET)