Adolf Belka [Sat, 30 Aug 2025 13:27:15 +0000 (15:27 +0200)]
fireinfo: housekeeping to merge patches into version v2.2.1
- As the last update was 5 years ago, I thought it good housekeeping to merge the four
patches into the fireinfo tarball
- Update of rootfile not required
- Changelog
v2.2.1
Inclusion of previous four patches into tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Fri, 29 Aug 2025 19:26:00 +0000 (21:26 +0200)]
tshark: Update to version 4.4.9
- Update from version 4.4.8 to 4.4.9
- Update of rootfile
- Changelog
4.4.9
Bug Fixes
wnpa-sec-2025-03 SSH dissector crash. Issue 20642.
RDM Product Detail List ID Disect incorrect. Issue 20612.
SCCP LUDT segmentation decoding fails. Issue 20647.
Ciscodump fails to start capture on Cisco IOS. Issue 20655.
[BACnet] WritePropertyMultiple closing context tag 1 not showing. Issue 20665.
Bug in LZ77 decoder; reads a 16-bit length when it should read a 32-bit
length. Issue 20671.
New and Updated Features
New Protocol Support
There are no new protocols in this release.
Updated Protocol Support
BACapp, LIN, MySQL, RDM, SABP, SCCP, sFlow, and SSH
New and Updated Capture File Support
There is no new or updated capture file support in this release.
Updated File Format Decoding Support
There is no updated file format support in this release.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Fri, 29 Aug 2025 19:25:59 +0000 (21:25 +0200)]
meson: Update to version 1.9.0
- Update from version 1.8.0 to 1.9.0
- Update of rootfile
- Changelog
1.9.0
Array .flatten() method
Arrays now have a .flatten() method, which turns nested arrays into a
single flat array. This provides the same effect that Meson often
does to arrays internally, such as when passed to most function
arguments.
clang-tidy's auto-generated targets correctly select source files
In previous versions, the target would run clang-tidy on every C-like
source files (.c, .h, .cpp, .hpp). It did not work correctly because
some files, especially headers, are not intended to be consumed as is.
It will now run only on source files participating in targets.
Added Qualcomm's embedded linker, eld
Qualcomm recently open-sourced their embedded linker.
https://github.com/qualcomm/eld
Meson users can now use this linker.
Added suffix function to the FS module
The basename and stem were already available. For completeness, expose
also the suffix.
Support response files for custom targets
When using the Ninja backend, Meson can now pass arguments to
supported tools through response files.
In this release it's enabled only for the Gnome module, fixing calling
gnome.mkenums() with a large set of files on Windows (requires
Glib 2.59 or higher).
meson format now has a --source-file-path argument when reading from stdin
This argument is mandatory to mix stdin reading with the use of editor
config. It allows to know where to look for the .editorconfig, and to
use the right section of .editorconfig based on the parsed file name.
Added license keyword to pkgconfig.generate
When specified, it will add a License: attribute to the generated .pc
file.
New experimental option rust_dynamic_std
A new option rust_dynamic_std can be used to link Rust programs so
that they use a dynamic library for the Rust libstd.
Right now, staticlib crates cannot be produced if rust_dynamic_std is
true, but this may change in the future.
Rust and non-Rust sources in the same target
Meson now supports creating a single target with Rust and non Rust
sources mixed together. In this case, if specified, link_language
must be set to rust.
Explicitly setting Swift module name is now supported
It is now possible to set the Swift module name for a target via the
swift_module_name target kwarg, overriding the default inferred from
the target name.
lib = library('foo', 'foo.swift', swift_module_name: 'Foo')
Top-level statement handling in Swift libraries
The Swift compiler normally treats modules with a single source file
(and files named main.swift) to run top-level code at program start.
This emits a main symbol which is usually undesirable in a library
target. Meson now automatically passes the -parse-as-library flag to
the Swift compiler in case of single-file library targets to disable
this behavior unless the source file is called main.swift.
Swift compiler receives select C family compiler options
Meson now passes select few C family (C/C++/Obj-C/Obj-C++) compiler
options to the Swift compiler, notably -std=, in order to improve the
compatibility of C code as interpreted by the C compiler and the
Swift compiler.
NB: This does not include any of the options set in the target's c_flags.
Swift/C++ interoperability is now supported
It is now possible to create Swift executables that can link to C++ or
Objective-C++ libraries. To enable this feature, set the target kwarg
swift_interoperability_mode to 'cpp'.
To import C++ code, specify a bridging header in the Swift target's
sources, or use another way such as adding a directory containing a
Clang module map to its include path.
Note: Enabling C++ interoperability in a library target is a breaking
change. Swift libraries that enable it need their consumers to enable
it as well, as per the Swift documentation.
Swift 5.9 is required to use this feature. Xcode 15 is required if the
Xcode backend is used.
lib = static_library('mylib', 'mylib.cpp')
exe = executable('prog', 'main.swift', 'mylib.h', link_with: lib,
swift_interoperability_mode: 'cpp')
Support for MASM in Visual Studio backends
Previously, assembling .masm files with Microsoft's Macro Assembler is
only available on the Ninja backend. This now also works on Visual
Studio backends.
Note that building ARM64EC code using ml64.exe is currently
unimplemented in both of the backends. If you need mixing x64 and
Arm64 in your project, please file an issue on GitHub.
Limited support for WrapDB v1
WrapDB v1 has been discontinued for several years, Meson will now
print a deprecation warning if a v1 URL is still being used. Wraps
can be updated to latest version using meson wrap update command.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from version 20250127.0 to 20250814.0
- Update of rootfile
- Changelog 20250814.0
What's New:
absl::Mutex now contains lower-case method names like lock() and
shared_lock() to align with standard C++ mutex methods. This allows
absl::Mutex to be used with std::scoped_lock and friends. The old names
are still present but may be removed in a future release.
The RAII Mutex-locker types like absl::MutexLock, absl::ReaderMutexLock,
and friends now accept references to absl::Mutex. The pointer-accepting
constructors are now deprecated, and may be removed in a future release.
Breaking Changes:
Nullability template types, which were deprecated in the May 2025 release,
have been removed.
absl::string_view(nullptr), which is undefined behavior according to the
C++ standard, now triggers an assert failure. Note that unless you
changed absl/base/options.h, absl::string_view is an alias for
std::string_view, so by default you will be inheriting the behavior of
your standard library instead of using the Abseil implementation.
Abseil's hash tables now require a hash function that has a return type
with size >= sizeof(size_t).
Known Issues
CHECK_<OP> is failing to compile on older versions of GCC when one of the
arguments is a C-style string. This is fixed by ba9a180 and will be
included in a future patch release. 20250512.1
What's New:
The polyfill types absl::any, absl::optional, and absl::variant are now
aliases for std::any, std::optional, and std::variant in all builds.
(Note that the polyfill implementation absl::string_view remains at the
present time, but it defaults to being an alias std::string_view in all
builds.)
Added absl::FastTypeId<Type>(), which evaluates at compile-time to a
unique id for the passed-in type.
Added absl::endian and absl::byteswap polyfills (25bce12).
Breaking Changes:
Abseil now requires at least C++17 and follows Google's Foundational C++
Support Policy. See this table for a list of currently supported versions
compilers, platforms, and build tools.
Nullability template types are deprecated and will be removed in a future
release. The macro-style annotations (absl_nonnull, absl_nullable) should
be used instead (caf854d).
Known Issues
None known at this time. 20250512.0
What's New:
The polyfill types absl::any, absl::optional, and absl::variant are now
aliases for std::any, std::optional, and std::variant in all builds.
(Note that the polyfill implementation absl::string_view remains at the
present time, but it defaults to being an alias std::string_view in all
builds.)
Added absl::FastTypeId<Type>(), which evaluates at compile-time to a
unique id for the passed-in type.
Added absl::endian and absl::byteswap polyfills (25bce12).
Breaking Changes:
Abseil now requires at least C++17 and follows Google's Foundational C++
Support Policy. See this table for a list of currently supported versions
compilers, platforms, and build tools.
Nullability template types are deprecated and will be removed in a future
release. The macro-style annotations (absl_nonnull, absl_nullable) should
be used instead (caf854d).
Known Issues
This release fails to compile with GCC7 and GCC8. This is fixed in 20250512.1. 20250127.1
What's New:
Added support for Bazel 8.0
Added support for Bazel Platforms for better portability
Added ABSL_ATTRIBUTE_VIEW and ABSL_ATTRIBUTE_OWNER for diagnosing certain
lifetime issues
Many performance improvements
A security issue in hash container create/resize has been fixed. Note that
the latest patch releases for previous LTS versions also address this issue.
Breaking Changes:
Bazel BUILD files now reference repositories by their canonical names from
the Bazel Central Registry. For example, Abseil is now @abseil-cpp
instead of @com_google_absl, and GoogleTest is now @googletest instead of
@com_google_googletest. Users still using the old WORKSPACE system may
need to use repo_mapping on repositories that still use the old names.
See 90a7ba6 for an example.
Other:
This will be the last release to support C++14. Future releases will
require at least C++17.
Known Issues
None known at this time.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Michael Tremer [Fri, 29 Aug 2025 20:54:17 +0000 (21:54 +0100)]
ovpnmain.cgi: Explicitely pass the gateway for static routes
OpenVPN seems to fail to use the correct gateway if the client does not
use the default pool. In that case, we need to explicitely push the
correct gateway.
Fixes: #13872 - Warning: route gateway is not reachable on any active network adapters Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Fri, 29 Aug 2025 11:36:44 +0000 (13:36 +0200)]
samba: Update to version 4.22.4
- Update from version 4.22.3 to 4.22.4
- Update of rootfile not required for any of the architectures
- Changelog
4.22.4
* BUG 14981: netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with
SysvolReady=0.
* BUG 15844: getpwuid does not shift to new DC when current DC is down.
* BUG 15876: Windows security hardening locks out schannel'ed netlogon dc
calls like netr_DsRGetDCName-
* BUG 15881: Unresponsive second DC can cause idmapping failure when using
idmap_ad-
* BUG 15840: kinit command is failing with Missing cache Error.
* BUG 15891: Figuring out the DC name from IP address fails and breaks
fork_domain_child().
* BUG 15816: vfs_streams_depot fstatat broken.
* BUG 15892: Delayed leader broadcast can block ctdb forever.
* BUG 14981: netr_LogonSamLogonEx returns NR_STATUS_ACCESS_DENIED with
SysvolReady=0.
* BUG 15663: Apparently there is a conflict between shadow_copy2 module and
virusfilter (action quarantine).
* BUG 15877: Fix handling of empty GPO link.
* BUG 15880: SMB ACL inheritance doesn't work for files created.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:49:03 +0000 (20:49 +0200)]
whois: Update to version 5.6.4
- Update from version 5.6.1 to 5.6.4
- Update of rootfile not required
- Changelog
5.6.4
* Updated the .cm and .to TLD servers.
5.6.3
* Added the .sr and .мон (.xn--l1acc, Mongolia) TLD servers.
* Use readpassphrase(3) on OpenBSD and FreeBSD.
5.6.2
* Updated the .post and .in (and related IDN TLDs) TLD servers.
* Removed 1 new gTLDs which is no longer active.
* Build-Depend on libcrypt-dev. (Closes: #1106977)
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:49:02 +0000 (20:49 +0200)]
sudo: Update to version 1.9.17p2
- Update from version 1.9.17p1 to 1.9.17p2
- Update of rootfile not required
- Changelog
1.9.17p2
* Fixed a bug introduced in sudo 1.9.16 that could result in sudo
sending SIGHUP to all processes on the system in certain rare
cases. The bug could manifest if sudo is running a command in
a pseudo-terminal, sudo terminates the command due to an internal
error, and the user's terminal is revoked. GitHub issue #458.
* Fixed a bug introduced in sudo 1.9.12 that caused sudo to abort
when the "intercept" and "intercept_verify" options are enabled
in sudoers and either the command line arguments or the environment
contains a string larger than the page size (usually 4096). This
only Linux affects systems that support the ptrace_readv_string()
function. GitHub issue #453.
* Fixed a bug in sudo's configure script introduced in sudo 1.9.17
that prevented mdoc-format man pages from being used on systems
without the mandoc utility. Bug #1077.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:49:01 +0000 (20:49 +0200)]
rpcbind: Update to version 1.2.8
- Update from version 1.2.7 to 1.2.8
- Update of rootfile not required
- Changelog
1.2.8
rpcinfo: Removed a number of "old-style function definition" warnings
rpcbind: Add -v flag to print version and config
This helps to see compiled time options, e.g. remote calls enablement.
$ ./rpcbind -v
rpcbind 1.2.7
debug: no, libset debug: no, libwrap: no, nss modules: files,
remote calls: no, statedir: /run/rpcbind, systemd: yes,
user: root, warm start: no
man/rpcbind: Update list of options
-L was removed in 718ab7e, -w added in 9b1aaa6, -f added in eb36cf1. Fixes: 718ab7e ("Removed the documentation about the non-existent '-L' flag") Fixes: 9b1aaa6 ("Allow the warms start code to be enabled at compile
time...") Fixes: eb36cf1 ("rpcbind: add no-fork mode")
Comment out ListenStream=@/run/rpcbind.sock
[nfs/nfs-utils/rpcbind] rpcbind: avoid dereferencing NULL from realloc() Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2173869
Move rpbind's default configuration to /run verses /var/run
Move rpcbind.lock to /run
Most of the distros have /var/run as symlink to /run.
Because /var may be a separate partition, and could even be mounted via
NFS, having to look directly to /run help to avoid issues rpcbind
startup early in boot when /var might not be available.
systemd/rpcbind.service.in: Want/After systemd-tmpfiles-setup
Add Want/After systemd-tmpfiles-setup.service. This is taken from Fedora
rpcbind-0.2.4-5.fc25 patch [1] which tried to handle bug #1401561 [2]
where /var/run/rpcbind.lock cannot be created due missing /var/run/
directory. But the suggestion to add RequiresMountFor=... was
implemented in ee569be ("Fix boot dependency in systemd service file").
But even with RequiresMountsFor=/run/rpcbind in rpcbind.service and
/run/rpcbind.lock there is error on openSUSE Tumbleweed with rpcbind
1.2.6:
rpcbind.service: Failed at step NAMESPACE spawning /usr/sbin/rpcbind:
Read-only file system
Adding systemd-tmpfiles-setup.service fixes it.
NOTE: Debian uses for this purpose remote-fs-pre.target (also works, but
systemd-tmpfiles-setup.service looks to me more specific).
openSUSE uses only After=sysinit.target as a result of #1117217 [3]
(also works).
[1] https://src.fedoraproject.org/rpms/rpcbind/blob/rawhide/f/rpcbind-0.2.4-systemd-service.patch
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1401561
[3] https://bugzilla.suse.com/show_bug.cgi?id=1117217
systemd/rpcbind.service.in: Add various hardenings options
We've been running rpcbind 1.2.6 with it in openSUSE since 2021.
NOTE: In systemd < 244 (released Nov 2019) some of these options are
unknown and will produce warnings, see
https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort
man/rpcbind: Add Files section to manpage
Previous commit added 3 non-default files, mention them in man page.
systemd/rpcbind.service.in: Add few default EnvironmentFile
Add some defaults so that distros can drop patches to configure it.
* openSUSE and Fedora use /etc/sysconfig/rpcbind
https://build.opensuse.org/projects/network/packages/rpcbind/files/0001-systemd-unit-files.patch?expand=1
https://src.fedoraproject.org/rpms/rpcbind/blob/f41/f/rpcbind-0.2.3-systemd-envfile.patch
* Debian uses /etc/rpcbind.conf and /etc/default/rpcbind
https://salsa.debian.org/debian/rpcbind/-/blob/buster/debian/rpcbind.service?ref_type=heads
Add all these 3 in order:
* /etc/rpcbind.conf
* /etc/default/rpcbind
* /etc/sysconfig/rpcbind
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:59 +0000 (20:48 +0200)]
nano: Update to version 8.6
- Update from version 8.5 to 8.6
- Update of rootfile not required
- Changelog
8.6
• The GotoLine menu accepts the prefixes ++ and -- for jumping
a number of lines forward or backward.
• Anchors are not forgotten when a line number is given on the
command line.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:58 +0000 (20:48 +0200)]
lsof: Update to version 4.99.5
- Update from version 4.99.4 to 4.99.5
- Update of rootfile not required
- Changelog
4.99.5
[linux] fix legacy linux kernel compatibility due to missing
/proc/self/ns (#329)
[linux] fix potential null pointer deference, reported by
@mono-trip (#332)
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:57 +0000 (20:48 +0200)]
libinih: Update to version 61
- Update from version 58 to 61
- Update of rootfile not required
- Changelog
61
add option to disable the test suite by @sage-etcher in #195
add ini_parse_string_length() that avoids internal strlen(), and ease… by
@lihuiba in #196
Fix bug where name only options are not processed after an error has
occurred by @msquire in #197
Optimise ini_rstrip() by @msquire in #198
60
test long lines by @isidroas in #190
Require C++ only for the host machine; bump project version to 59 by
@bgilbert in #191
meson: fix tests under Windows by @neheb in #192
59
INIReader: change variable visibility from private to protected by
@meiyasan in #165
Add meson test driver by @matoro in #170
Swap rstrip() and lskip() to reduce execution time of strlen() by
@isidroas in #177
Add preprocessor exclusions when INI_ALLOW_MULTILINE=0 by @isidroas in #178
tests: define only once the compiler and flag by @isidroas in #179
Test that long sections are truncated by @isidroas in #180
Add INIReader Sections and Keys methods by @Ishan09811 in #186
If a line is longer than INI_MAX_LINE, consume input up to next newline by
@benhoyt in #188
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:55 +0000 (20:48 +0200)]
harfbuzz: Update to version 11.4.3
- Update from version 11.2.1 to 11.4.3
- Update of rootfile
- Changelog
11.4.3
- Make shaping fail much faster for certain malformed fonts (e.g., those that
trigger infinite recursion).
- Fix undefined behaviour introduced in 11.4.2.
- Fix detection of the “Cambria Math” font when fonts are scaled, so the
workaround for the bad `MATH` table constant is applied.
11.4.2
- Various performance and memory usage improvements.
- The `hb-shape` command line tool can now be built with the amalgamated
`harfbuzz.cc` source.
- Fix regression in handling version 2 of `avar` table.
- Increase various buffer length limits for better handling of fonts that
generate huge number of glyphs per codepoint (e.g. Noto Sans Duployan)
- Improvements to the harfrust shaper for more accurate testing.
11.4.1
- Fix clang compiler warnings.
11.4.0
- General shaping and subsetting speedups.
- Fix in Graphite shaping backend when glyph advances became negative.
- Subsetting improvements, pruning empty mark-attachment lookups.
- Don't use the macro name `_S`, which is reserved by system liberaries.
- Build fixes and speedup.
- Add a `kbts` shaping backend that calls into the `kb_text_shape`
single-header shaping library. This is purely for testing and
performance evaluation and we do NOT recommend using it for any
other purposes.
11.3.3
- Fix but in vertical shaping of fonts without the vmtx table.
11.3.2
- Fix build with non-compliant C++11 compilers that don't recognize
the "and" keyword.
11.3.1
- Fix crasher in the glyph_v_origin function introduced in
11.3.0.
11.3.0
- Speed up handling fonts with very large number of variations:
- Drawing by up to 40%.
- Calculating glyph extents by up to 15%.
- Getting horizontal glyph advances by up to 45%.
- Speed up getting horizontal and vertical glyph advances by up to 24%.
- Significantly speed up vertical text shaping.
- Various documentation improvements.
- Various build improvements.
- Various subsetting improvements.
- Various improvements to Rust font functions (fontations integration) and shaper (HarfRust integration).
- Rename harfruzz option and shaper to harfrust following upstream rename.
- Implement hb_face_reference_blob() for DirectWrite font functions.
- New API:
+hb_font_get_glyph_origins_func_t
+hb_font_get_glyph_h_origins_func_t
+hb_font_get_glyph_v_origins_func_t
+hb_font_funcs_set_glyph_h_origins_func()
+hb_font_funcs_set_glyph_v_origins_func()
+hb_font_get_glyph_h_origins()
+hb_font_get_glyph_v_origins()
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:53 +0000 (20:48 +0200)]
gdbm: Update to version 1.26
- Update from version 1.25 to 1.26
- Update of rootfile not required
- Changelog
1.26
* Fixed build on musl libc
* Fixed build on MacOS
* Improved testsuite
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:42 +0000 (20:48 +0200)]
btrfs-progs: Update to version 6.16
- Update from version 6.15 to 6.16
- Update of rootfile not required
- Changelog
6.16
* mkfs:
* print label of existing filesystem if attempting to overwrite
* remove note about changed defaults in 6.15
* discard support detection uses the ioctl and not sysfs, this should
work for all types of block devices
* device usage: fix printing units of partition sizes, used to be in 512B
sectors
* defrag: new option --nocomp to request no compression (kernel 6.17)
* check: detect missing orphan items for deleted subvolumes
* subvol delete: don't print warning if filesystem is mounted with
user_subvol_rm_allowed
* build: add build support for Android
* other:
* cleanups and refactoring
* sync sources with kernel
* documentation updates
* CI and test updates
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
These records are used for discovering the receiver endpoint for DNS
notification messages. For more information, see
draft-ietf-dnsop-generalized-notify-09. [GL #5440]
Feature Changes
Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1, and DS digest
type 1.
RSASHA1 and RSASHA1-NSEC-SHA1 DNSKEY algorithms have been deprecated by
the IETF and should no longer be used for DNSSEC. DS digest type 1
(SHA1) has also been deprecated in BIND 9. Validators are now expected
to treat these algorithms and digest as unknown, resulting in some
zones being treated as insecure when they were previously treated as
secure. Warnings have been added to named and tools when these
algorithms and this digest are being used for signing.
Zones signed with RSASHA1 or RSASHA1-NSEC-SHA1 should be migrated to a
different DNSKEY algorithm.
Zones with DS or CDS records with digest type 1 (SHA1) should be
updated to use a different digest type (e.g. SHA256) and the digest
type 1 records should be removed. [GL #5358]
Bug Fixes
Stale RRsets in a CNAME chain were not always refreshed.
Previously, with serve-stale enabled and a CNAME chain that contained a
stale RRset, the refresh query didn’t always properly refresh the stale
RRsets. This has been fixed. [GL #5243]
Add RPZ extended DNS error for zones with a CNAME override policy
configured.
Previously, when the zone was configured with a CNAME override policy,
or the response policy zone contained a wildcard CNAME, the extended
DNS error code was not added. This has been fixed. [GL #5342]
Fix dig issues.
When used with the +keepopen option, dig could terminate unexpectedly
in rare situations. Additionally, dig could hang and fail to shutdown
properly when interrupted during a query. These have been fixed. [GL
#5381]
Log dropped or slipped responses in the query-errors category.
Responses which were dropped or slipped because of Response Rate
Limiting (RRL) were logged in the rate-limit category instead of the
query-errors category, as documented in the ARM. This has been fixed.
[GL #5388]
synth-from-dnssec was not working in some scenarios.
Aggressive use of DNSSEC-Validated cache with NSEC was not working in
scenarios when no parent NSEC was in cache. This has been fixed. [GL
#5422]
Clean enough memory when adding new ADB names/entries under memory
pressure.
The ADB memory cleaning is opportunistic even when BIND is under memory
pressure (in the overmem condition). named now ensures that the
assigned memory limit is not exceeded by releasing twice the amount of
memory allocated for each new ADB name/entry when under memory
pressure. [GL !10637]
Prevent spurious validation failures.
Under rare circumstances, validation could fail if multiple clients
simultaneously iterated the same set of DNSSEC signatures. This has
been fixed. [GL #3014]"
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org> Reviewed-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:49:04 +0000 (20:49 +0200)]
wsdd: Update to version 0.9
- Update from version 0.8 to 0.9
- Update of rootfile not required
- Changelog
0.9
Added
- Add command line argument to set source port for multicast message for better
firewall interoperability (#216)
- Add initial support for SunOS (#223), without dynamic address/interface
monitoring. Thanks to Carsten Grzemba.
- Add Socket-activated systemd service (#218). Thanks to Alessandro Astone.
Changed
- Devices are now recorded based on their URI provided in the endpoint
reference address, which is not neccessarily a UUID. This also affects API
(see #226).
- make `/etc/default/wsdd` optional for systemd (see #212)
- Remove support for Python 3.7 and 3.8 in Github workflows.
Fixed
- Clean conection turn-down for Python pre-3.13. Thanks to Alessandro Astone
- Handle TimeoutError in metadata exchange.
- Proper handling of endpoint addresses as URIs, not UUIDs, see #226.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:49:00 +0000 (20:49 +0200)]
postfix: Update to version 3.10.4
- Update from version 3.10.2 to 3.10.4
- Update of rootfile not required
- Changelog
3.10.4
Fixes for postscreen(8):
Bugfix (defect introduced: postfix-2.2, date 20050203): after detecting a
lookup table change, and after starting a new postscreen process, the old
postscreen process logged an ENOTSOCK error while attempting to accept a
connection on a socket that it was no longer listening on. This error was
introduced first in the multi_server skeleton code, and was five years later
duplicated in the event_server skeleton that was created for postscreen.
Problem reported by Florian Piekert.
Bugfix (defect introduced: Postfix 2.8, date 20101230): after detecting a cache
table change and before starting a new postscreen process, the old postscreen
process did not close the postscreen_cache_map, and therefore kept an
exclusive lock that could prevent a new postscreen process from starting.
Problem reported by Florian Piekert.
Fixes for tlsproxy(8):
Bugfix (defect introduced: Postfix 3.7): incorrect backwards compatible support
for the legacy configuration parameters tlsproxy_client_level and
tlsproxy_client_policy. This disabled the tlsproxy TLS client role when a
legacy parameter was set (instead of the newer tlsproxy_client_security_level
or tlsproxy_client_policy_maps). Reported by John Doe, diagnosed by Viktor
Dukhovni.
Bugfix (defect introduced: Postfix 3.4): with the TLS client role disabled by
configuration, the tlsproxy daemon dereferenced a null pointer while handling
a tlsproxy client request. Reported by John Doe.
Reducing process churn: Postfix daemons no longer automatically restart after a
btree:, dbm:, hash:, lmdb:, or sdbm: table file modification time change, when
they opened that table for writing.
Portability: deleted an <openssl/engine.h> build dependency, because the feature
is being removed from OpenSSL, and Postfix no longer needs it.
Cleanup: with "tls_required_enable = yes", the Postfix SMTP client will no longer
maintain TLSRPT statistics for messages that contain a "TLS-Required: no"
header. This can prevent TLSRPT notifications for TLSRPT notifications.
Bugfix (defect introduced: Postfix 3.6, date 20200710): Postfix TLS client code
logged "Untrusted TLS connection" (wrong) instead of "Trusted TLS connection"
(right), for a new or resumed TLS session, when a server offered a trusted
(valid PKI trust chain) certificate that did not match the expected server name
pattern. Fix by Viktor Dukhovni.
3.10.3
This release fixes defects that were introduced in Postfix 3.10. These were
fixed first in the Postfix 3.11 unstable release.
The defects exist only with the default configuration "tls_required_enable = yes".
Bugfix (defect introduced: Postfix-3.10, date 20250117): include the
current TLS security level in the SMTP connection cache lookup key for
lookups by next-hop destination, to avoid reusing the same SMTP
connection when sending messages with and without a "TLS-Required: no"
header. Likewise, include the current TLS security level in the TLS
session lookup key, to avoid reusing the same TLS session info when
sending messages with and without a "TLS-Required: no" header.
Bugfix (defect introduced: Postfix-3.10, date 20250117): the Postfix SMTP
client attempted to look up TLSA records even with "TLS-Required: no".
This could result in unnecessary failures. Fix by Viktor Dukhovni &
Wietse.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:54 +0000 (20:48 +0200)]
git: Update to version 2.51.0
- Update from version 2.50.1 to 2.51.0
- Update of rootfile not required
- Changelog
2.51.0
UI, Workflows & Features
* Userdiff patterns for the R language have been added.
* Documentation for "git send-email" has been updated with a bit more
credential helper and OAuth information.
* "git cat-file --batch" learns to understand %(objectmode) atom to
allow the caller to tell missing objects (due to repository
corruption) and submodules (whose commit objects are OK to be
missing) apart.
* "git diff --no-index dirA dirB" can limit the comparison with
pathspec at the end of the command line, just like normal "git
diff".
* "git subtree" (in contrib/) learned to grok GPG signing its commits.
* "git whatchanged" that is longer to type than "git log --raw"
which is its modern rough equivalent has outlived its usefulness
more than 10 years ago. Plan to deprecate and remove it.
* An interchange format for stash entries is defined, and subcommand
of "git stash" to import/export has been added.
* "git merge/pull" has been taught the "--compact-summary" option to
use the compact-summary format, intead of diffstat, when showing
the summary of the incoming changes.
* "git imap-send" has been broken for a long time, which has been
resurrected and then taught to talk OAuth2.0 etc.
* Some error messages from "git imap-send" has been updated.
* When "git daemon" sees a signal while attempting to accept() a new
client, instead of retrying, it skipped it by mistake, which has
been corrected.
* The reftable ref backend has matured enough; Git 3.0 will make it
the default format in a newly created repositories by default.
* "netrc" credential helper has been improved to understand textual
service names (like smtp) in addition to the numeric port numbers
(like 25).
* Lift the limitation to use changed-path filter in "git log" so that
it can be used for a pathspec with multiple literal paths.
* Clean up the way how signature on commit objects are exported to
and imported from fast-import stream.
* Remove unsupported, unused, and unsupportable old option from "git
log".
* Document recently added "git imap-send --list" with an example.
* "git pull" learned to pay attention to pull.autostash configuration
variable, which overrides rebase/merge.autostash.
* "git for-each-ref" learns "--start-after" option to help
applications that want to page its output.
* "git switch" and "git restore" are declared to be no longer
experimental.
* "git -c alias.foo=bar foo -h baz" reported "'foo' is aliased to
'bar'" and then went on to run "git foo -h baz", which was
unexpected. Tighten the rule so that alias expansion is reported
only when "-h" is the sole option.
Performance, Internal Implementation, Development Support etc.
* "git pack-objects" learned to find delta bases from blobs at the
same path, using the --path-walk API.
* CodingGuidelines update.
* Add settings for Solaris 10 & 11.
* Meson-based build/test framework now understands TAP output
generated by our tests.
* "Do not explicitly initialize to zero" rule has been clarified in
the CodingGuidelines document.
* A test helper "test_seq" function learned the "-f <fmt>" option,
which allowed us to simplify a lot of test scripts.
* A lot of stale stuff has been removed from the contrib/ hierarchy.
* "git push" and "git fetch" are taught to update refs in batches to
gain performance.
* Some code paths in "git prune" used to ignore the passed-in
repository object and used the `the_repository` singleton instance
instead, which has been corrected.
* Update ".clang-format" and ".editorconfig" to match our style guide
a bit better.
* "make coccicheck" succeeds even when spatch made suggestions, which
has been updated to fail in such a case.
* Code clean-up around object access API.
* Define .precision to more canned parse-options type to avoid bugs
coming from using a variable with a wrong type to capture the
parsed values.
* Flipping the default hash function to SHA-256 at Git 3.0 boundary
is planned.
* Declare weather-balloon we raised for "bool" type 18 months ago a
success and officially allow using the type in our codebase.
* GIT_TEST_INSTALLED was not honored in the recent topic related to
SHA256 hashes, which has been corrected.
* The pop_most_recent_commit() function can have quite expensive
worst case performance characteristics, which has been optimized by
using prio-queue data structure.
* Move structure definition from unrelated header file to where it
belongs.
* To help our developers, document what C99 language features are
being considered for adoption, in addition to what past experiments
have already decided.
* The reftable unit tests are now ported to the "clar" unit testing
framework.
* Redefine where the multi-pack-index sits in the object subsystem,
which recently was restructured to allow multiple backends that
support a single object source that belongs to one repository. A
MIDX does span multiple "object sources".
* Reduce implicit assumption and dependence on the_repository in the
object-file subsystem.
Bug Fixes
* A memory-leak in an error code path has been plugged.
(merge 7082da85cb ly/commit-graph-graph-write-leakfix later to maint).
* A memory-leak in an error code path has been plugged.
(merge aedebdb6b9 ly/fetch-pack-leakfix later to maint).
* Some leftover references to documentation source files that no
longer exist, due to recent ".txt" -> ".adoc" renaming, have been
corrected.
(merge 3717a5775a jw/doc-txt-to-adoc-refs later to maint).
* "git stash -p <pathspec>" improvements.
(merge 468817bab2 pw/stash-p-pathspec-fixes later to maint).
* "git send-email" incremented its internal message counter when a
message was edited, which made logic that treats the first message
specially misbehave, which has been corrected.
(merge 2cc27b3501 ag/send-email-edit-threading-fix later to maint).
* "git stash" recorded a wrong branch name when submodules are
present in the current checkout, which has been corrected.
(merge ffb36c64f2 kj/stash-onbranch-submodule-fix later to maint).
* When asking to apply mailmap to both author and committer field
while showing a commit object, the field that appears later was not
correctly parsed and replaced, which has been corrected.
(merge abf94a283f sa/multi-mailmap-fix later to maint).
* "git maintenance" lacked the care "git gc" had to avoid holding
onto the repository lock for too long during packing refs, which
has been remedied.
(merge 1b5074e614 ps/maintenance-ref-lock later to maint).
* Avoid regexp_constraint and instead use comparison_constraint when
listing functions to exclude from application of coccinelle rules,
as spatch can be built with different regexp engine X-<.
(merge f2ad545813 jc/cocci-avoid-regexp-constraint later to maint).
* Updating submodules from the upstream did not work well when
submodule's HEAD is detached, which has been improved.
(merge ca62f524c1 jk/submodule-remote-lookup-cleanup later to maint).
* Remove unnecessary check from "git daemon" code.
(merge 0c856224d2 cb/daemon-fd-check-fix later to maint).
* Use of sysctl() system call to learn the total RAM size used on
BSDs has been corrected.
(merge 781c1cf571 cb/total-ram-bsd-fix later to maint).
* Drop FreeBSD 4 support and declare that we support only FreeBSD 12
or later, which has memmem() supported.
(merge 0392f976a7 bs/config-mak-freebsd later to maint).
* A diff-filter with negative-only specification like "git log
--diff-filter=d" did not trigger correctly, which has been fixed.
(merge 375ac087c5 jk/all-negative-diff-filter-fix later to maint).
* A failure to open the index file for writing due to conflicting
access did not state what went wrong, which has been corrected.
(merge 9455397a5c hy/read-cache-lock-error-fix later to maint).
* Tempfile removal fix in the codepath to sign commits with SSH keys.
(merge 4498127b04 re/ssh-sign-buffer-fix later to maint).
* Code and test clean-up around string-list API.
(merge 6e5b26c3ff sj/string-list later to maint).
* "git apply -N" should start from the current index and register
only new files, but it instead started from an empty index, which
has been corrected.
(merge 2b49d97fcb rp/apply-intent-to-add-fix later to maint).
* Leakfix with a new and a bit invasive test on pack-bitmap files.
(merge bfd5522e98 ly/load-bitmap-leakfix later to maint).
* "git fetch --prune" used to be O(n^2) expensive when there are many
refs, which has been corrected.
(merge 87d8d8c5d0 ph/fetch-prune-optim later to maint).
* When a ref creation at refs/heads/foo/bar fails, the files backend
now removes refs/heads/foo/ if the directory is otherwise not used.
(merge a3a7f20516 ps/refs-files-remove-empty-parent later to maint).
* "pack-objects" has been taught to avoid pointing into objects in
cruft packs from midx.
* "git remote" now detects remote names that overlap with each other
(e.g., remote nickname "outer" and "outer/inner" are used at the
same time), as it will lead to overlapping remote-tracking
branches.
(merge a5a727c448 jk/remote-avoid-overlapping-names later to maint).
* The gpg.program configuration variable, which names a pathname to
the (custom) GPG compatible program, can now be spelled with ~tilde
expansion.
(merge 7d275cd5c0 jb/gpg-program-variable-is-a-pathname later to maint).
* Our <sane-ctype.h> header file relied on that the system-supplied
<ctype.h> header is not later included, which would override our
macro definitions, but "amazon linux" broke this assumption. Fix
this by preemptively including <ctype.h> near the beginning of
<sane-ctype.h> ourselves.
(merge 9d3b33125f ps/sane-ctype-workaround later to maint).
* Clean-up compat/bswap.h mess.
(merge f4ac32c03a ss/compat-bswap-revamp later to maint).
* Meson-based build did not handle libexecdir setting correctly,
which has been corrected.
(merge 056dbe8612 rj/meson-libexecdir-fix later to maint).
* Document that we do not require "real" name when signing your
patches off.
(merge 1f0fed312a bc/contribution-under-non-real-names later to maint).
* "git commit" that concludes a conflicted merge failed to notice and remove
existing comment added automatically (like "# Conflicts:") when the
core.commentstring is set to 'auto'.
(merge 92b7c7c9f5 ac/auto-comment-char-fix later to maint).
* "git rebase -i" with bogus rebase.instructionFormat configuration
failed to produce the todo file after recording the state files,
leading to confused "git status"; this has been corrected.
(merge ade14bffd7 ow/rebase-verify-insn-fmt-before-initializing-state later to maint).
* A few file descriptors left unclosed upon program completion in a
few test helper programs are now closed.
(merge 0f1b33815b hl/test-helper-fd-close later to maint).
* Interactive prompt code did not correctly strip CRLF from the end
of line on Windows.
(merge 711a20827b js/prompt-crlf-fix later to maint).
* The config API had a set of convenience wrapper functions that
implicitly use the_repository instance; they have been removed and
inlined at the calling sites.
* "git add/etc -p" now honor the diff.context configuration variable,
and also they learn to honor the -U<n> command-line option.
(merge 2b3ae04011 lm/add-p-context later to maint).
* The case where a new submodule takes a path where there used to be a
completely different subproject is now dealt with a bit better than
before.
(merge 5ed8c5b465 kj/renamed-submodule later to maint).
* The deflate codepath in "git archive --format=zip" had a
longstanding bug coming from misuse of zlib API, which has been
corrected.
* Other code cleanup, docfix, build fix, etc.
(merge b257adb571 lo/my-first-ow-doc-update later to maint).
(merge 8b34b6a220 ly/sequencer-update-squash-is-fixup-only later to maint).
(merge 5dceb8bd05 ly/do-not-localize-bug-messages later to maint).
(merge 61372dd613 ly/commit-buffer-reencode-leakfix later to maint).
(merge 81cd1eef7d ly/pack-bitmap-root-leakfix later to maint).
(merge bfc9f9cc64 ly/submodule-update-failure-leakfix later to maint).
(merge 65dff89c6b ma/doc-diff-cc-headers later to maint).
(merge efb61591ee jm/bundle-uri-debug-output-to-fp later to maint).
(merge a3d278bb64 ly/prepare-show-merge-leakfix later to maint).
(merge 1fde1c5daf ac/preload-index-wo-the-repository later to maint).
(merge 855cfc65ae rm/t2400-modernize later to maint).
(merge 2939494284 ly/run-builtin-use-passed-in-repo later to maint).
(merge ff73f375bb jg/mailinfo-leakfix later to maint).
(merge 996f14c02b jj/doc-branch-markup-fix later to maint).
(merge 1e77de1864 cb/ci-freebsd-update-to-14.3 later to maint).
(merge b0e9d25865 jk/fix-leak-send-pack later to maint).
(merge f3a9558c8c bs/remote-helpers-doc-markup-fix later to maint).
(merge c4e9775c60 kh/doc-config-subcommands later to maint).
(merge de404249ab ps/perlless-test-fixes later to maint).
(merge 953049eed8 ts/merge-orig-head-doc-fix later to maint).
(merge 0c83bbc704 rj/freebsd-sysinfo-build-fix later to maint).
(merge ad7780b38f ps/doc-pack-refs-auto-with-files-backend-fix later to maint).
(merge f4fa8a3687 rh/doc-glob-pathspec-fix later to maint).
(merge b27be108c8 ja/doc-git-log-markup later to maint).
(merge 14d7583beb pw/config-kvi-remove-path later to maint).
(merge f31abb421d jc/do-not-scan-argv-without-parsing later to maint).
(merge 26552cb62a jk/unleak-reflog-expire-entry later to maint).
(merge 339d95fda9 jc/ci-print-test-failures-fix later to maint).
(merge 8c3add51a8 cb/meson-avoid-broken-macos-pcre2 later to maint).
(merge 5247da07b8 ps/meson-clar-decls-fix later to maint).
(merge f3ef347bb2 ch/t7450-recursive-clone-test-fix later to maint).
(merge 4ac3302a1a jc/doc-release-vs-clear later to maint).
(merge 3bdd897413 ms/meson-with-ancient-git-wo-ls-files-dedup later to maint).
(merge cca758d324 kh/doc-fast-import-historical later to maint).
(merge 9b0781196a jc/test-hashmap-is-still-here later to maint).
(merge 1bad05bacc jk/revert-squelch-compiler-warning later to maint).
(merge 3a7e783d9c dl/squelch-maybe-uninitialized later to maint).
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 26 Aug 2025 18:48:52 +0000 (20:48 +0200)]
fping: Update to version 5.4
- Update from version 5.3 to 5.4
- Update of rootfile not required
- Changelog
5.4
Bugfixes
- Memory allocation safety checks for event storage (thanks David.A for bug report)
- Fix off-by-one boundary check in seqmap code (thanks David.A for bug report)
- The minimum value for the period (-p flag) is now 0.001 milliseconds,
since it probably never makes sense to use a smaller value, and to avoid doing
a very large memory allocation for event storage.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Mon, 25 Aug 2025 09:19:13 +0000 (11:19 +0200)]
backup.pl: Ensure ncp-disable is removed from old backups and DATACIPHERS added
- With commit https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=e04f5376ba18767a6a9eccf104c472295a75340b
then the settings file which is hashed into %vpnsettings already exists and so none
of the defaults are set. Running the ovpnmain.cgi code resolves this for most of the
settings but not for ncp-disable being present in server.conf and no DATACIPHERS entry
in the settings file. ncp-disable then causes the openvpn server to fail to start as
it is no longer recognised in OpenVPN-2.6
- This patch checks if ncp-disable is in the server.conf file from the restored backup
and if it is it is then removed and the default values for DATACIPHERS is added into
the settings file.
- Tested out in my vm testbed and successfully worked. The previously found issue after
the above patch was added in has been resolved.
- Associated patch in this set is to do a similar thing for the update.sh file for CU197
Tested-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Sat, 23 Aug 2025 13:46:09 +0000 (15:46 +0200)]
backup.pl: Restart openvpn daemons after restore.
- As the daemons are running when the restore is done then if the daemons are not
restarted the running daemon stays with the previous config and not with the restored
version.
Tested-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Michael Tremer [Thu, 14 Aug 2025 13:33:26 +0000 (13:33 +0000)]
glibc: Update to 2.42
This release adds support for SFrames
(https://www.phoronix.com/news/SFrame-Merged-Glibc-2.42) and explicitely
enables SSP (which was always on before, but just in case).
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Wed, 20 Aug 2025 16:51:47 +0000 (18:51 +0200)]
ovpnmain.cgi: Fixes bug13869 - shows values from vpnsettings in advanced server page
- In the previous version the cgiparams hash was filled from the ovpn/settings file.
However with the new version of this file that is no longer done. For the values
of protocol, redirect_gw, mssfix, dataciphers, route_push the hash file was changed
from %cgiparams to %vpnsettings. This was not done for the values of dciphers, dauth
or tlsauth. These values still got their entries from the %cgiparams hash but this
hash is empty as it has not been filled.
- This patch replaces the use of $cgiparams with $vpnsettings.
- Tested this out on my vm testbed and confirmed that the saved values are now shown on
the advanced settings wui page.
Fixes: bug13869 Tested-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Wed, 20 Aug 2025 16:51:47 +0000 (18:51 +0200)]
ovpnmain.cgi: Fixes bug13869 - shows values from vpnsettings in advanced server page
- In the previous version the cgiparams hash was filled from the ovpn/settings file.
However with the new version of this file that is no longer done. For the values
of protocol, redirect_gw, mssfix, dataciphers, route_push the hash file was changed
from %cgiparams to %vpnsettings. This was not done for the values of dciphers, dauth
or tlsauth. These values still got their entries from the %cgiparams hash but this
hash is empty as it has not been filled.
- This patch replaces the use of $cgiparams with $vpnsettings.
- Tested this out on my vm testbed and confirmed that the saved values are now shown on
the advanced settings wui page.
Fixes: bug13869 Tested-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Wed, 13 Aug 2025 20:53:00 +0000 (22:53 +0200)]
fcron: Update to version 3.4.0
- Update from version 3.2.1 to 3.4.0
- Update of the rootfile
- Changelog
3.4.0
Changed the default "From" header of emails sent by fcron, to be
RFC5322-compliant. This is done (and can be reverted if needed) via the new
fcron.conf option maildisplayname.
Changed the default fcron reload delay from 60s to 5s.
Better doc and logging on bootrun jobs.
3.3.3
Fixed infinite loop when an lavg job reaches its 'until' deadline and gets
rescheduled as the next job to run.
Improved signal safety.
Improved log messages for: indentation, resume after suspend, child task
completion.
Fixed compilation warnings: SELinux, signal handling.
Updated copyright years.
3.3.2
Add compilation option (configure's '--with-max-fcrontab-reload-delay-seconds')
to allow faster or even instant reload for non-root users (thanks Elliot Wolk).
Added fcron.conf option 'maildisplayname', to configure the displayname fcron
uses when sending email. This allows fcron to be configured ot be
RFC5322-compliant (thanks Marco Emilio "sphakka" Poleggi)
Fixed fcrondyn output issue where two lines would be joined due to a long
shell command.
Improve documentation wording (thanks Michael Kopp)
3.3.1
Updated SELinux code to stop using deprecated headers (fixes build on more
recent systems)
Install programs with R/W perms for the owner
Fixed @reboot when using systemd
Various other fixes and improvements in doc, install and boot scripts (in
particular under systemd)
3.3.0
fcron now handles computer suspend/resume. On Linux systems, fcron can detect
resumes and measure the suspend time. On other OSes, a script must be run at
suspend and resume via system hooks.
Added a new option 'runatresume' (as well as a Vixie-cron-style '@resume'
shortcut), to run a job when the system resumes from suspend/hibernation.
Refactored the socket (for fcrondyn), suspend and select code.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Wed, 13 Aug 2025 20:53:01 +0000 (22:53 +0200)]
libgcrypt: Update to version 1.11.2
- Update from version 1.11.0 to 1.11.2
- Update of the rootfile
- Changelog
1.11.2
Bug fixes:
- Fix link errors in regression test t-thread-local on some
platforms (e.g. NetBSD). [T7634]
- Add missing file to allow building for RISC-V. [T7647]
- Support secp256k1 by KEM API. GnuPG has recently switched to use
the KEM interface and a few folks are using this curve. [T7698]
- Fix a missing initialization in RSA's generate_fips.
[rG448693047f]
Other:
- Silence GCC 15 warnings [rG7ebe90e555,T7617]
- Provide a prototype for __udiv_qrnnd for PowerPC and Alpha which
is required due to GCC-15 changes. [T7721]
- Add missing abi versions and machine tags for PowerPC assembly
with GCC-15. [T7721]
- Use '.rodata' section for read-only data of poly1305-p10le.
[T7721]
Interface changes relative to the 1.11.1 release:
GCRY_KEM_RAW_P256R1 NEW enum.
1.11.1
Bug fixes:
- Fix build regression on 32 bit Windows using Clang. [T7175]
- Fix build regression on macOS due to symbol naming. [T7170]
- Fix Kyber secret-dependent branch introduced by recent versions
of Clang. [rCf765778e82]
- Fix build regression due to the use of AVX512 in Blake. [T7184]
- Do not build i386 asm on amd64 and vice versa. [T7220]
- Fix build regression on armhf with gcc-14. [T7226]
- Return the proper error code on malloc failure in hex2buffer.
[rCc51151f5b0]
- Fix long standing bug for PRIME % 2 == 0. [rC639b0fca15]
Performance:
- Add AES Vector Permute intrinsics implementation for AArch64.
[rC94a63aedbb]
- Add GHASH AArch64/SIMD intrinsics implementation. [rCfec871fd18]
- Add RISC-V vector permute AES. [rCb24ebd6163]
- Add GHASH RISC-V Zbb+Zbc implementation. [rC0f1fec12b0]
- Add ChaCha20 RISC-V vector intrinsics implementation.
[rC8dbee93ac2]
- Add SHA3 acceleration for RISC-V Zbb extension. [rC1a660068ba]
Other:
- Add CET support for i386 and amd64 assembly. [T7220]
- Add PAC/BTI support for AArch64 asm. [T7220]
- Apply changes to Kyber from upstream for final FIPS 203.
[rCcc95c36e7f]
- Introduce an internal API for a revampled FIPS service indicator.
[T7340]
- Several improvements for constant time operation by the
introduction of Least Leak Intended (LLI) variants of internal
functions. [T7519,T7490]
- Remove WindowsCE support. [T7486]
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Wed, 13 Aug 2025 16:30:15 +0000 (18:30 +0200)]
zlib-ng: Update to version 2.2.5
- Update from version 2.2.4 to 2.2.5
- Update of rootfile
- Changelog
2.2.5
Important fixes
RiscV: chunkset_rvv: fix SIGSEGV in CHUNKCOPY #1889
MSVC: Disable optimizations for AVX512 GET_CHUNK_MAG causing inflate
failure #1884
Fix building with runtime CPU detection disabled (native) #1931
Also check for ZMM support when detecting VPCLMULQDQ support #1932
Revert "Clean up insert_match() in deflate_medium" due to performance
regression #1938
Buildsystem
Pass POSIX_C_SOURCE for std::alligned_alloc try_compile checks #1896
X86_AVX512VNNI: check for _mm256_dpbusd_epi32 too #1944
CMake: Fix incorrect declaration of FORCE_SSE2 #1880
CMake: Fix CXXFLAGS when coverage enabled #1902
CMake: Remove late enable_language calls #1903
CMake: [FreeBSD] Define _XOPEN_SOURCE for gtest_zlib #1900
CMake: Add bindir into zlib.pc.in for compatibility with Cygwin and Msys2
#1920
Configure: riscv: add bash configure script support for riscv 1904
Tests/Benchmarks
Test: Fix pointer type mismatch #1897
Test: Add large 1mb buffer test for crc32 hashing #1913
Changes to running benchmark during tests #1892
CI
CI: Restore support macOS prior 10.15 #1878
CI: fixes for RISC-V #1890
CI: Preinstall packages needed for testing and benchmark #1894
CI: Remove deprecated ubuntu-20.04 image from CI #1898
CI: Replace deprecated windows-2019 with windows-2022 #1923
Misc
Add .gitignore to allow run tests with zlib-ng/corpora and local dataset
from working copy #1930
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from version 3500200 to 3500400
- Update of rootfile
- Changelog 3500400
Fix two long-standings cases of the use of uninitialized variables in obscure
circumstances. 3500300
Fix a possible memory error that can occur if a query is made against against
FTS5 index that has been deliberately corrupted in a very specific way.
Fix the parser so that it ignored SQL comments in all places of a
CREATE TRIGGER statement. This resolves a problem that was introduced by the
introduction of the SQLITE_DBCONFIG_ENABLE_COMMENTS feature in version 3.49.0.
Fix an incorrect answer due to over-optimization of an AND operator. Forum post f4878de3e.
Fix minor makefile issues and documentation typos.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from version 20250512 to 20250812
- Update of rootfile not required
- Changelog 20250812
Security updates for INTEL-SA-01249
Security updates for INTEL-SA-01308
Security updates for INTEL-SA-01310
Security updates for INTEL-SA-01311
Security updates for INTEL-SA-01313
Security updates for INTEL-SA-01367
Update for functional issues. Refer to 13th/14th Gen Intel® Core™ Processor
Specification Update for details.
Update for functional issues. Refer to 3rd Gen Intel® Xeon® Processor
Scalable Family Specification Update for details.
Update for functional issues. Refer to 4th Gen Intel® Xeon® Scalable
Processors Specification Update for details.
Update for functional issues. Refer to 5th Gen Intel® Xeon® Scalable
Processors Specification Update for details.
Update for functional issues. Refer to 6th Gen Intel® Xeon® Scalable
Processors Specification Update for details.
Update for functional issues. Refer to Intel® Core™ Ultra 200 V Series
Processor for details.
Update for functional issues. Refer to Intel® Core™ Ultra Processor for
details.
Update for functional issues. Refer to Intel® Core™ Ultra Processor
(Series 2) for details.
Update for functional issues. Refer to Intel® Xeon® 6700-Series Processor
Specification Update for details.
Update for functional issues. Refer to Intel® Xeon® D-2700 Processor
Specification Update for details.
Details about new and updated platforms can be found at
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Mon, 11 Aug 2025 09:35:16 +0000 (11:35 +0200)]
grub: Fix CVE's by updating to version 2.12 with commit 0e36779
- Update from version 2.12 to 2.12 and all commits up to 0e36779
- Update of rootfiles for all architectures
- Back in Feb 2025 20 CVE's were identified in Grub-2.12 and 73 security patchers were
applied. However there has been no movement to doing a fresh release. Arch Linux has
just used the committs up to the last of the security patches. However since then they
have also continued takingnew snapshots of the grub git commits to do updates.
- This patch takes the last commit in the grub master dated 11th July 2025.
- Built successfully also on aarch64 & riscv64
- Tested out on my vm testbed. The grub screen worked as expected and the grub version
has been made to show as 2.12.0e36779. This way any further update before version
2.13 is released will follow the same pattern of adding the number of the commit
used in the snapshot.
- The snapshot required the bootstrap script to be used. However this either needs
internet access to download the gnulib git sources or requires a local copy of the
gnulib git sources to be available. Therefore I took the snapshot and downloaded a
local copy of the gnulinb sources to my desktop build system and created a
bootstrapped version of the snapshot, which is the source file I have provided
into the sources and used by the lfs. This means that the autoconf -vfi command in
the lfs is not needed. I just commented it out in case there is a release package in
the future.
- I am not sure if this will be merged into CU197 or wait for CU198.
- As far as I can see all the CVE-s require acces to the grub system, which means local
physical access so don't believe these are critical for the IPFire user base but
it might be good for someone more experienced than me to check the CVE's.
- Changelog
For details of all changes then the grub git repo has to be looked at.
https://gitweb.git.savannah.gnu.org/gitweb/?p=grub.git;a=shortlog;h=refs/heads/master
There is no changelog of all the commits, except for a list of the CVE's that were
identified and fixed in this update. These CVE's are listed below.
CVE-2024-45775: commands/extcmd: Missing check for failed allocation
In grub_extcmd_dispatcher() function grub2 calls grub_arg_list_alloc()
to allocate memory for the grub's argument list, however it misses to
check in case the memory allocation failed. Once the allocation failed,
a NULL point will be processed by the parse_option() function leading
grub to crash or in some rare scenarios corrupt the IVT data.
CVE-2024-45776: grub-core/gettext: Integer overflow leads to Heap OOB Write and
Read
When reading language .mo file in grub_mofile_open(), grub2 fails to verify to
a integer overflow when allocating its internal buffer. A crafted .mo file may
lead to the buffer size calculation to overflow leading to Out-of-bound reads
and writes. An attacker may leverage this flaw to leak sensitive data or
overwrite critical data possibly leading to the circumvention of secure boot
protections.
CVE-2024-45777: grub-core/gettext: Integer overflow leads to Heap OOB Write
The calculation of the translation buffer when reading a language .mo file in
grub_gettext_getstr_from_position() may overflow leading to a Out-of-bound
write. This may be leveraged by an attacker to overwrite senstive grub2's heap
data, eventually leading to the circumvention of secure boot protections
CVE-2024-45778: fs/bfs: Integer overflow in the BFS parser
There's a stack overflow when reading a BFS file system. A crafted BFS
filesystem may lead to a uncontrolled loop causing grub2 to crash
CVE-2024-45779: fs/bfs: Integer overflow leads to Heap OOB Read (Write?) in the
BFS parser
There's an integer overflow in the BFS file system driver. When reading a file
with indirect extent map grub2 fails to validate the number of extent entries
to be read. A crafted or corrupted BFS filesystem may cause a integer overflow
during the file reading, leading to a Heap Ouf-of-Bounds read. As consequence
sensitive data may be leaked or the grub2 to crash.
CVE-2024-45780: fs/tar: Integer Overflow causes Heap OOB Write
When reading tar files, grub2 allocates an internal buffer for the file name
however it fails to properly verify the allocation against possible Integer
Overflows. It's possible to cause the allocation length to overflow with
a crafted tar file leading to a head Out-of-bounds write, as consequence an
attacker may leverage this to eventually circumvent secure boot protections.
CVE-2024-45781: fs/ufs: OOB write in the heap
When reading a symbolic link's name from a UFS filesystem, grub2 fails to
validate the string length taken as an input. The lack of validation may lead
to a heap Out-of-bounds write, causing data integrity issues and eventually
allowing an attacker to circumvent secure boot protections.
CVE-2024-45782: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
When reading a HFS volume's name at grub_fs_mount(), the HFS filesystem driver
performs a strcpy() using the user provided volume name as input without proper
validating the volume name's length. This may read to a heap based
Out-of-bounds write, impacting on grub's sensitive data integrity and
eventually leading to secure boot protection bypass.
CVE-2024-45783: fs/hfs+: refcount can be decremented twice
When failing to mount a HFS+ grub hfsplus filesystem driver doesn't properly
set a ERRNO value. This may lead to a NULL pointer access.
CVE-2025-0622: command/gpg: Use-after-free due to hooks not being removed on
module unload
In some scenarios hooks created by loaded modules are not being removed when
the related module is being unloaded. An attacker may leverage this by forcing
the grub2 to call the hooks once the module which registered it was unloaded,
leading to a Use-after-free vulnerability. If correctly exploited this
vulnerability may result int Arbitrary Code Execution eventually allowing the
attacker to by-pass secure boot protections.
CVE-2025-0624: net: Out-of-bounds write in grub_net_search_config_file()
During the network boot process when trying to search for the configuration
file, grub copies data from a user controlled environment variable into an
internal buffer using grub_strcpy() function. During this step it fails to
consider the environment variable length when allocating the internal buffer,
resulting in a out-of-bounds write. If correctly exploited this issue may
result in remote code execution through the same network segment the grub is
searching for the boot information, which can be used to by-pass secure boot
protections.
CVE-2025-0677: UFS: Integer overflow may lead to heap based out-of-bounds write
when handling symlinks
When performing a symlink lookup the grub's UFS module check the inode's data
size to allocate the internal buffer for reading the file content however it
misses to check if the symlink data size has overflown. If that happens
grub_malloc() may be called with a smaller value than needed, as consequence
when further reading the data from disk into the buffer
grub_ufs_lookup_symlink() function will write past the end of the allocated
size. An attack may leverage that by crafting a malicious filesystem and as
a result it will corrupt data stored in the heap, it's possible that arbitrary
code execution may be achieved through it and to be used to by-pass secure boot
mechanisms.
CVE-2025-0678: squash4: Integer overflow may lead to heap based out-of-bounds
write when reading data
When reading data from a squash4 filesystem, grub's squash4 fs module uses
user-controlled parameters from the filesystem geometry to determine the
internal buffers size, however it misses to properly check for integer
overflows. A maliciouly crafted filesystem may lead some of those buffer size
calculation to overflow, causing it to perform a grub_malloc() operation with
a smaller size than expected. As a result the direct_read() will perform a heap
based out-of-bounds write during data reading. This flaw may be leveraged to
corrupt grub's internal critical data and may result in arbitrary code
execution by-passing secure boot protections.
CVE-2025-0684: reiserfs: Integer overflow when handling symlinks may lead to
heap based out-of-bounds write when reading data
When performing a symlink lookup from a reiserfs filesystem, grub's reiserfs fs
module uses user-controlled parameters from the filesystem geometry to
determine the internal buffers size, however it misses to properly check for
integer overflows. A maliciouly crafted filesystem may lead some of those
buffer size calculation to overflow, causing it to perform a grub_malloc()
operation with a smaller size than expected. As a result the
grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with
a overflown length parameter leading to a heap based out-of-bounds write during
data reading. This flaw may be leveraged to corrupt grub's internal critical
data and may result in arbitrary code execution by-passing secure boot
protections.
CVE-2025-0685: jfs: Integer overflow when handling symlinks may lead to heap
based out-of-bounds write when reading data
When reading data from a jfs filesystem, grub's jfs filesystem module uses
user-controlled parameters from the filesystem geometry to determine the
internal buffers size, however it misses to properly check for integer
overflows. A maliciouly crafted filesystem may lead some of those buffer size
calculation to overflow, causing it to perform a grub_malloc() operation with
a smaller size than expected. As a result the grub_jfs_lookup_symlink() function
will write past of the internal buffer length during grub_jfs_read_file(). This
flaw may be leveraged to corrupt grub's internal critical data and may result
in arbitrary code execution by-passing secure boot protections.
CVE-2025-0686: romfs: Integer overflow when handling symlinks may lead to heap
based out-of-bounds write when reading data
When performing a symlink lookup from a romfs filesystem, grub's romfs
filesystem module uses user-controlled parameters from the filesystem geometry
to determine the internal buffers size, however it misses to properly check for
integer overflows. A maliciouly crafted filesystem may lead some of those
buffer size calculation to overflow, causing it to perform a grub_malloc()
operation with a smaller size than expected. As a result the
grub_romfs_read_symlink() may cause a out-of-bounds writes when calling
grub_disk_read() function. This flaw may be leveraged to corrupt grub's
internal critical data and may result in arbitrary code execution by-passing
secure boot protections.
CVE-2025-0689: udf: Heap based buffer overflow in grub_udf_read_block() may
lead to arbitrary code execution
When reading data from disk, the grub's UDF filesystem module utilizes the user
controlled data length metadata to allocate its internal buffers. In certain
scenarios, while iterating through disk sectors, it assumes the read size from
the disk is always smaller than the allocated buffer size which is not
guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow
resulting in critical data to be corrupted, resulting in the risk of arbitrary
code execution by-passing secure boot protections.
CVE-2025-0690: read: Integer overflow may lead to out-of-bounds write
The read command is used to read the keyboard input from the user, while reads
it keeps the input length in a 32-bit integer value which is further used to
reallocate the line buffer to accept the next character. During this process,
with a line big enough it's possible to make this variable to overflow leading
to a out-of-bounds write in the heap based buffer. This flaw may be leveraged
to corrupt grub's internal critical data and secure boot bypass is not
discarded as consequence.
CVE-2025-1118: commands/dump: The dump command is not in lockdown when secure
boot is enabled
The grub's dump command is not blocked when grub is in lockdown mode. This
allows the user to read any memory information, an attacker may leverage that
in order to extract signatures, salts and other sensitive information from the
memory.
CVE-2025-1125: fs/hfs: Interger overflow may lead to heap based out-of-bounds write
When reading data from a hfs filesystem, grub's hfs filesystem module uses
user-controlled parameters from the filesystem metadata to calculate the
internal buffers size, however it misses to properly check for integer
overflows. A maliciouly crafted filesystem may lead some of those buffer size
calculation to overflow, causing it to perform a grub_malloc() operation with
a smaller size than expected. As a result the hfsplus_open_compressed_real()
function will write past of the internal buffer length. This flaw may be
leveraged to corrupt grub's internal critical data and may result in arbitrary
code execution by-passing secure boot protections.
Tested-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Michael Tremer [Tue, 5 Aug 2025 10:44:51 +0000 (11:44 +0100)]
IPS: Rename bypassed to "Offloaded"
Bypassed seems to suggest to some people that the traffic was never
looked at, when in fact the IPS is rather offloading anything it is no
longer interested in. I think this is a better phrase.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 22 Jul 2025 21:22:08 +0000 (23:22 +0200)]
vectorscan: Update to version 5.4.12
- Update from version 5.4.11 to 5.4.12
- Update of rootfile
- Removal of patch for sse4.2 as changes now part of source tarball
- Changelog
5.4.12
Multiple changes since last release, this will be the last 100% ABI and API
compatible with Hyperscan release.
Next versions will include major refactors and API extensions, it will be
mostly backwards compatible however.
Without particular order, platform support is now:
* Linux (x86, Arm, Power)
* FreeBSD 14 (x86, Arm, Power)
* MacOS 14+ (x86, Arm)
In total more than 200 configurations in the CI are tested for every PR.
Other features:
- Fat Runtime supported for Arm as well (ASIMD/SVE/SVE2).
- Initial implementations for Arm SVE/SVE2 algorithms added, thanks to
Yoan Picchi from Arm.
- SIMDe support added, used as an alternative backend for existing
platforms, but mostly interesting for allowing Vectorscan to build
in new platforms without a supported SIMD engine.
- Various speedups and optimizations.
- Cppcheck and clang-tidy fixes throughout the code, both have been
added to CI for multiple configurations, but only cppcheck triggers
a build failure for now.
Various bugfixes, most important listed:
- Speed up truffle with 256b TBL instructions (#290)
- Fix Clang Tidy warnings (#295)
- Clang 17+ is more restrictive on rebind<T> on MacOS/Boost, remove
warning (#332)
- partial_load_u64 will fail if buf == NULL/c_len == 0 (#331)
- Bugfix/fix avx512vbmi regressions (#335)
- fix missing hs_version.h header (closes #198)
- hs_valid_platform: Fix check for SSE4.2 (#310)
- Fixed out of bounds read in AVX512VBMI version of
fdr_exec_fat_teddy … (#333)
- Fix noodle SVE2 off by one bug (#313)
- Make vectorscan accept \0 starting pattern (#312)
- Fix 5.4.11's config step regression (#327)
- Fix double shufti's vector end false positive (#325)
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Tue, 22 Jul 2025 16:55:43 +0000 (18:55 +0200)]
suricata: Update to version 8.0.0
- Update from version 7.0.11 to 8.0.0
- Update of rootfile
- patch file updated for disabling sid-2210059
- Changelog
8.0.0
Security #7658: http2: global tx (stream id 0) may open file and never close
it(HIGH - CVE 2025-53538)
Bug #7798: dpdk: auto count of threads assigns more threads than affined
Bug #7791: http: BUG_ON assertion reached in packet path
Bug #7790: affinity: intermittent unittest failures
Bug #7789: dpdk: compilation warning of a function without prototype
Bug #7783: smtp: incorrect inspection window
Bug #7752: decode: no parent packet flow for ip-in-ipv6
Bug #7678: mpm/ac: error "Just ran out of space in the queue"
Bug #7649: lib: suricata version in sys crate needs to be updated on build
Bug #1484: src: BUG_ON(1) statements in the packet path
Optimization #7643: excessive mtu messages at start up
Optimization #7212: strtoul: replace with ByteExtractString variant
Optimization #6264: mpm/ac-ks: reduce stack usage
Optimization #4753: lua: fix inconsistency in the init "needs" key
Documentation #7749: doc: update user manual seciton on RPMs
Documentation #7723: doc/exceptions: review 'inspection' terminology
Documentation #7648: rtd: set "latest" to last stable release starting with 8.0.0
Documentation #7078: devguide: document current ffi naming style
Documentation #6955: devguide: update coding-style docs
Documentation #6566: userguide: add description for missing EVE krb fields
Documentation #6288: eve/schema: generate tables of data for app-layer protocols
Documentation #6252: userguide/install: move Ubuntu distros to their own page
Documentation #6069: userguide/install: move RPM distros to their own page
Documentation #6022: devguide: explain how the engine identifies applayer
protocols
Documentation #5911: userguide: update & bring guide for installation on
Windows to RtD
Task #7758: decode: add stats counters for ipv4/ipv6 over ipv4
Task #7750: packaging: rpm for RHEL 10
Task #7632: suricata-lua-sys: tag with a non-prerelease version
Task #6941: lua: review and document lua rule return types
Task #6814: libsuricata: opt-in signal handling
Task #6359: detect/analyzer: add more details for the ICMP icode keyword
Task #6262: tracking: reduce stack usage
8.0.0-rc1
Feature #7715: rules: add option to skip flow tracking for a packet
Feature #7714: detect: add pre_flow rule hook
Feature #7713: detect: add tcp.wscale keyword to match on TCP wscale option
values
Feature #7712: detect: add pre_stream rule hook
Feature #7702: commandline: add --list-app-layer-hooks option
Feature #7645: pgsql: add CopyIn subprotocol/mode
Feature #7635: eve: include transaction count
Feature #7599: mime: add email.received keyword
Feature #7597: mime: add email.url keyword
Feature #7593: mime: add email.message_id keyword
Feature #7507: rules: ftp.completion_code keyword
Feature #7506: rules: ftp.reply_received keyword
Feature #7505: rules: ftp.mode keyword
Feature #7504: rules: ftp.dynamic_port keyword
Feature #7372: Datajson: a dataset evolution
Feature #7047: eve: add ip version field
Feature #7036: DPDK NUMA setup: choose correct CPUs from worker-cpu-set
Feature #6805: cpu-affinity: enhance CPU affinity logic with per-interface
NUMA preferences
Feature #6695: tls: log extensions
Feature #6259: pgsql: add `query` detection keyword
Feature #5692: http: brotli content encoding for HTTP/1.1
Feature #4099: app-layer: allow direct rule keyword registration
Feature #3952: protocols: implement mDNS
Feature #2290: lua: use script as transform
Bug #7747: affinity: warnings in the granular thread affinity settings code
Bug #7746: suricatasc does not handle reconnect
Bug #7735: brotli: old crate version has integer underflow
Bug #7732: http1: use cursor wrapper handling EOF for brotli
Bug #7730: dcerpc: uint16 overflow (rust debug assertion)
Bug #7725: decode/ipv4: missing ip-in-ip case handling
Bug #7698: firewall: eve verdict field should state "accept" instead of alert
Bug #7694: flow: elephant flow counts previous bytes revisiting an index
Bug #7689: Dataset of type IP can't set IPv4
Bug #7687: flow: non-TCP protocol timeout handling leads to missing flows
Bug #7681: flow: race condition at shutdown leads to duplicate flows
Bug #7671: lua: suricata-lua-sys needs to honor MSAN oss-fuzz flags
Bug #7668: http: lack of setting updated_ts leads to firewall bypass
Bug #7665: transaction rules: support filesize
Bug #7653: ips: deconflict pass flow and drop packet rules
Bug #7647: pgsql: empty request logged if password message disabled
Bug #7634: hyperscan: coverity warnings
Bug #7579: detect/files: local_file_id not incremented if inspection buffer is
NULL
Bug #7568: pcap: continuous file reading fails on an empty directory
Bug #7549: detect: using different sticky buffers for byte_extract and
byte_jump leads to undefined value before doing the jump
Bug #7498: rust: cleanup of extern "C" functions and no_mangle
Bug #7479: segfault using dummy config
output.eve-log.types.alert.payload-buffer-size = 0
Bug #7420: detect-engine: warning fgets could get negative value
Bug #7390: byte_extract: issue with saved 'name' in distance keyword
Bug #7374: dpdk: iface-copy should not be mandatory
Bug #7344: build: build can sometimes fail copying the lua headers into place
Bug #7285: Websocket compression mishandling
Bug #7236: plugins: custom transaction loggers cannot be registered by a plugin
Bug #7019: snmp: probing parser returns ALPROTO_FAILED instead of
ALPROTO_UNKNOWN if slice.len() < 4
Bug #7004: app-layer: wrong tx may be logged for stream rules
Bug #6981: dpdk: compiler warnings about lossy integer precision
Bug #6400: log of DNS answer is in wrong direction
Bug #6186: Integer overflows 64 to 32 bytes
Bug #5739: htp: handle alloc failure for user data
Bug #5177: detect/analyzer: rule analyzer warns about http buffers usage
Bug #4815: unix socket: ftp memcap missing from socket commands
Bug #3436: suricatasc: crashing using command 'reopen-log-files'
Optimization #7733: transforms: move base64 transform pure rust
Optimization #7708: http1: add tx iterator
Optimization #7529: detect/dns: move wrapper code from C to rust
Optimization #7353: files: remove deprecated force-md5 config option
Optimization #7292: CI: clang-format rechecks every main-7.0.x commit
Optimization #7083: detect/dataset: skip adding localstatedir if fullpath is
provided
Task #7727: lua: suricata.log library
Task #7673: libsuricata: rate_filter callback
Task #7656: fast.lua: update script to reflect library use
Task #7609: lua: suricata.util lib
Task #7608: lua: turn tls into lib
Task #7607: lua: turn ssh into lib
Task #7606: lua: turn smtp into lib
Task #7605: lua: turn ja3 into lib
Task #7603: lua: turn hassh into lib
Task #7598: mime: add email.x_mailer
Task #7591: mime: add email.date keyword
Task #7491: lua: turn file into lua lib
Task #7490: lua: turn rule into lua lib
Task #7487: lua: turn flowints into lib
Task #7486: lua: turn flowvars into lib
Task #7461: suricata-verify: pass all tests
Task #7079: rust: unify rust ffi style
Task #7026: app-protos: trigger raw stream inspection
Task #6573: rust: set new minimum Rust version for Suricata 8
Task #3695: research: libhwloc for better autoconfiguration
Documentation #7683: mime: add email.attachment keyword
Documentation #7329: doc: explain the priority ports setting
Documentation #7143: doc: legacy keyword http_host used in examples
Documentation #5485: userguide: explain that the http.header_names buffer is
normalized
8.0.0-beta1
Feature #7644: pgsql: add CopyOut subprotocol/mode
Feature #7633: dpdk: refrain from creating TX queues on zero TX descriptors
Feature #7620: smb: configurable logging
Feature #7596: mime: add email.to keyword
Feature #7595: mime: add email.subject keyword
Feature #7592: mime: add email.from keyword
Feature #7588: mime: add email.cc keyword
Feature #7565: dcerpc: rpc interfaces info in request event
Feature #7533: detect/ldap: add ldap.request.attribute_type and
ldap.request.attribute keywords, and same for responses
Feature #7532: detect/ldap: add keywords for LDAPResult
Feature #7517: detect: smtp.mail_from keyword
Feature #7516: detect: smtp.rcpt_to keyword
Feature #7515: detect: smtp.helo keyword
Feature #7513: detect/integers: add support for negated strings when enum is used
Feature #7508: rules: ftp.reply keyword
Feature #7503: rules: ftp.command_data keyword
Feature #7502: rules: ftp.command keyword
Feature #7485: rules: allow specifying explicit hooks
Feature #7482: eve/flow: log tcp session reuse as a timeout reason
Feature #7481: rules/actions: explicit action scopes
Feature #7477: ldap: add support for AbandonRequest
Feature #7471: detect/ldap: add ldap.distinguished_name keywords for request
and response
Feature #7453: detect/ldap: add ldap.request.operation and
ldap.response.operation keywords
Feature #7433: eve/alert: enrich decoder event rules
Feature #7403: requires: add ability to check for a rule keyword
Feature #7382: dpdk: create separate packet mempools per queue
Feature #7381: dpdk: when running with ice driver fully start only when link
state change event is caught
Feature #7380: dpdk: provide "auto" option for RX/TX descriptors
Feature #7373: dpdk: provide "auto" option to mempool-size property
Feature #7337: dpdk: implement configuration of RSS using rte_flow rules for
major cards
Feature #7330: dpdk: support HW VLAN stripping
Feature #7320: flow: add user registerable flow update callbacks
Feature #7319: flow: add user registerable flow initialization callback
Feature #7311: http1: log invalid status as string
Feature #7291: sdp: implements sticky buffer
Feature #7243: lua: expose dataset functions
Feature #7240: libsuricata: use provided threads and packets
Feature #7204: sip: rustify sticky buffers
Feature #7203: ldap: extend parser for udp
Feature #7202: ldap: frame support
Feature #7170: hyperscan: Cache Hyperscan databases to disk to speed up the
startup
Feature #7120: threshold: add backoff type
Feature #7108: tls: ALPN keyword
Feature #7098: eve: add payload length field
Feature #7074: lua: expose base64 functions
Feature #7073: lua: expose hashing functions (md5/sha1/sha256)
Feature #7055: tls: log ALPN
Feature #7051: websocket: data frame
Feature #7045: tls-store: add support client certs
Feature #7017: dns: add OPT rdata struct and parsing
Feature #7012: rules: add dns.response sticky buffer
Feature #7011: dns: additional section parsing and logging
Feature #6967: multi-tenancy: support thresholding per tenant
Feature #6943: pcap: datalink type 229 not (yet) supported in module PcapFile
Feature #6939: lua: incremement stat when a lua rule exhausts its instruction
count
Feature #6857: iprep: support seeing if rule is part of a rep list
Feature #6856: http: anomaly when request line is missing protocol
Feature #6832: pcap/log: Support BPFs for filtering pcap output
Feature #6827: arp: implement decoder and logger
Feature #6822: threshold: support tracking by flow
Feature #6788: bypass: decouple stream.bypass dependency from TLS encrypted
bypass
Feature #6739: dpdk: warn the user if user-settings are adjusted to the device
capabilities
Feature #6666: dns: add keyword for dns rrtype: dns.rrtype
Feature #6648: detect: integer: support bitmasks
Feature #6647: detect: integers: support for enumerations
Feature #6646: detect: integer: support negated ranges
Feature #6645: detect: integer parsed with hexadecimal notation
Feature #6637: requires: add skipped rules to stats
Feature #6627: sdp: add protocol parser and logger
Feature #6621: dns: add keyword for dns rcode: dns.rcode
Feature #6550: profiling/rules: allow enabling profiling for pcap file runs
Feature #6546: detect/transform: strip_pseudo_headers
Feature #6497: dns: new detection buffer: dns.query.name
Feature #6496: dns: new detection buffer: dns.answer.name
Feature #6487: detect/transform: from_base64
Feature #6480: plugins: allow plugins to specify the version of suricata they
are for
Feature #6455: txbits: support for new type of bits
Feature #6439: rules: add to_lowercase transform
Feature #6426: http2: app-layer-event and normalization when userinfo is in
the :authority pseudo header for the http.host header
Feature #6396: rules: add protocol string support for mqtt
Feature #6379: ja4: support for TLS and QUIC
Feature #6374: sip: add sticky buffers for headers
Feature #6366: pop3: protocol detection
Feature #6290: http: support case insensitive testing of header name existence
Feature #6260: flow: flow matching excluding packet recursion level
Feature #6215: flow/output: log triggered exception policy
Feature #6164: rules: allow matching on flow pkts and bytes
Feature #6090: eve/alert: missing dcerpc metadata
Feature #6079: eve/dcerpc: eve/smb: log dcerpc uuid with request/response txs
Feature #5976: eve/stats: allow hiding counters whose value is 0
Feature #5972: rules: "requires" keyword representing the minimum version of
suricata to support the rule
Feature #5839: dpdk: power saving mode
Feature #5816: stats: exception policy counters
Feature #5773: doh: support DNS over HTTPS (DoH)
Feature #5743: http2: add frame support
Feature #5734: ssh: add frame support
Feature #5665: rules: bidirectional transaction matching
Feature #5647: rules: mark flow as elephant flow
Feature #5646: rules: allow matching on flow pkts and bytes in either direction
Feature #5489: research: multi version rules; or version dependent rules
Feature #5466: detect: allow alert-then-pass logic
Feature #5446: rules: allow ranges in dns.opcode value
Feature #5234: tls: subjectAltName buffer
Feature #5082: smb: keyword for matching the SMB files
Feature #5075: smb: keyword for the SMB version
Feature #4974: eve: log rule references
Feature #4905: smtp: add stream app-layer frame support
Feature #4904: dcerpc: frames support
Feature #4853: eve: Add information about Suricata version
Feature #4777: lua: implement sandboxing
Feature #4776: lua: vendor latest lua stable
Feature #4321: http2: Support link between packets in the same stream
Feature #4102: plugins: support creating app-layer parser, logger and detect
Feature #3958: enip: convert protocol parser to rust
Feature #3487: mime: multi-part parser in Rust
Feature #3351: sip: parse traffic over tcp
Feature #2816: vlan: support more than 2 layers
Feature #2696: http: implement parser in rust
Feature #2695: websocket support
Feature #2486: prefilter/fast_pattern logic for flowbits
Feature #2377: deprecate: ssh.softwareversion and ssh.protoversion
Feature #2280: http: rules that match both request and response
Feature #1971: lua: make mandatory
Feature #1520: multi-tenancy: verbose output clarity
Feature #1199: protocol: LDAP support
Feature #1125: smtp: improve protocol detection
Feature #1065: rules: introduce vlan id keyword
Feature #845: stats: track memory consumption
Security #7615: datasets: signature keyword setting can cause high memory
usage(MODERATE - CVE 2025-29916)
Security #7613: decode_base64: signature can do large
memory allocation(HIGH - CVE 2025-29917)
Security #7526: detect: infinite loop in DetectEngineContentInspectionInternal
with negated pcre(HIGH - CVE 2025-29918)
Security #7465: ldap: bound of number of transactions is not fully enforced
Security #7464: doh2: buffer is not really limited to 65K as should be for DNS
Security #7458: af-packet: defrag option can lead to truncated packets
(HIGH - CVE 2025-29915)
Security #7450: tracking: signature can allocate arbitrary amount of memory
Security #7411: tcp: generic detection bypass using TCP urgent support
(HIGH - CVE 2024-55629)
Security #7393: tcp: segfault on StreamingBufferSlideToOffsetWithRegions
(CRITICAL - CVE 2024-55627)
Security #7366: bpf: oversized bpf file can lead to buffer overflow
(MODERATE - CVE 2024-55626)
Security #7280: dns: quadratic complexity in logging and invalid json as
output(HIGH - CVE 2024-55628)
Security #7267: ja4: non alphanumeric characters in alpn lead to panic
(CRITICAL - CVE 2024-47522)
Security #7229: detect: write to read-only memory in transforms
(CRITICAL - CVE 2024-55605)
Security #7209: thash: random factor not used; possible abusive hash
collisions(CRITICAL - CVE 2024-47187)
Security #7195: datasets: rule with unset makes suricata abort
(HIGH - CVE 2024-45795)
Security #7191: http: quadratic complexity in headers processing/finding
(CRITICAL - CVE 2024-45797)
Security #7183: smb: hashmap entries not removed for error responses
Security #7104: http2: oom from duplicate headers(CRITICAL - CVE 2024-38535)
Security #7085: eve: transactions can be logged an arbitrary number of times
Security #7067: defrag: off by one leads to possible evasion
(HIGH - CVE 2024-45796)
Security #7040: defrag: id reuse can lead to invalid reassembly
(CRITICAL - CVE 2024-37151)
Security #7029: http/range: segv when http.memcap is reached
(HIGH - CVE 2024-38536)
Security #6987: modbus: txs without responses are never freed
(MODERATE - CVE 2024-38534)
Security #6902: base64: off-by-three overflow in DecodeBase64()
(HIGH - CVE 2024-32664)
Security #6900: http2: timeout logging headers(HIGH - CVE 2024-32663)
Security #6892: http2: oom on copying compressed headers
(CRITICAL - CVE 2024-32663)
Security #6866: eve: excessive ssh long banner logging(HIGH - CVE 2024-28870)
Security #6799: ssh: quadratic complexity in overlong banner
(CRITICAL - CVE 2024-28870)
Security #6796: output/filestore: slowdown because of running OutputTxLog on
useless packets
Security #6770: log: arbitrary-length value can be logged
Security #6757: libhtp: quadratic complexity checking after request line
missing protocol(CRITICAL - CVE 2024-28871)
Security #6680: smb: pcap with many open files takes too much time
Security #6675: ip-defrag: packet can be considered complete even with holes
(MODERATE - CVE 2024-32867)
Security #6669: ip defrag: re-assembly error in bsd policy
(MODERATE - CVE 2024-32867)
Security #6668: ip defrag: final overlapping packet can lead to "hole" in
re-assembled data(MODERATE - CVE 2024-32867)
Security #6493: ip defrag: several issues with overlap handling
Security #6481: http2: quadratic complexity in find_or_create_tx not bounded
by max-tx(CRITICAL - CVE 2024-23836)
Security #6477: smtp: quadratic complexity from unbounded number of
transaction per flow(CRITICAL - CVE 2024-23836)
Security #6444: http1: quadratic complexity from infinite folded headers
(CRITICAL - CVE 2024-23837)
Security #6441: detect: heap use after free with http.request_header keyword
(CRITICAL - CVE 2024-23839)
Security #6411: pgsql: quadratic complexity leads to over consumption of memory
(HIGH - CVE 2024-23835)
Security #6299: mqtt: pcap with anomalies takes too long to process because of
app-layer-event detection
Security #5926: http2: evasion by splitting header fields over frames
(HIGH - CVE 2024-24568)
Security #5921: http1: configurable limit for maximum number of live
transactions per flow(CRITICAL - CVE 2024-23836)
Bug #7618: af-packet: setting bpf fails
Bug #7577: detect/files: file.data does not use content passed when closing
the file internally
Bug #7567: dcerpc: assertion triggered !((res.needed + res.consumed < input_len))
Bug #7562: detect/flow: null deference in signature parsing
Bug #7560: detect/krb5: undefined behavior with krb5.ticket_encryption when
passing -INT32_MAX
Bug #7556: quic: valid traffic blocked in IPS mode
Bug #7554: tls: parser error on unACK'd data in FIN shutdown
Bug #7552: app-layer: misdetection if response is seen first without request
Bug #7548: dcerpc: avoid integer underflow
Bug #7523: rules/prefilter: prefilter keyword ignored when in content rule
Bug #7521: detect/ip-only: false positive alerts on pseudo packets ending a
one direction flow
Bug #7495: protocol detection: probing parsers do not finish as soon as possible
Bug #7469: smtp: recognize when client initiated TLS
Bug #7467: detect: checksum detection broken by stream.checksum-validation
Bug #7466: lua: Flowvar memory leak
Bug #7455: flow: flow timeout behavior non-deterministic
Bug #7449: app-layer metadata does not get logged for stream rules and
unidirectional protocols
Bug #7447: NULL dereference in ThreadLogFileHashFreeFunc in bug-5198 SV test
Bug #7444: dpdk: RSS key length missmatch on ice (E810) card with DPDK version
22.11.6
Bug #7440: eve/frame: incomplete frame logging
Bug #7437: protocol detection : probing parsers are limited to 32 by use of
bitflag
Bug #7436: sip: remove UPDATE pattern as already used by HTTP/1.1
Bug #7435: fuzz: fix protocol detection target initialization sequence
Bug #7422: tcp: GAP event set on unack'd data following a RST
Bug #7418: requires: rules with unmet requirements are still loaded
Bug #7417: rust: remove shared reference to static mutable
Bug #7414: detect: decoder event rules fail to match on invalid packets
Bug #7409: http: crash in strip_pseudo_headers transform
Bug #7406: eve: Alerts with app_proto=tls no longer logs the tls app data
Bug #7398: datasets: scan-build warning call to blocking fn inside critical
section
Bug #7394: ldap: support starttls with tls upgrade
Bug #7365: flow-manager: multi Flow Manager memory leak problem
Bug #7361: rules: unknown internal events not being detected as errors
Bug #7359: eve/syslog: crashes on use
Bug #7338: rust: different int types turn garbage on FFI boundary
Bug #7334: asan/profiling: global-buffer-overflow error
Bug #7333: tls: impossible to log alpns with 'custom' logging
Bug #7332: tls: fix duplicate EVE field issuerdn
Bug #7326: http: FN with prefilter if the first of multi buffer did not match
Bug #7325: sdp: one or more time descriptions
Bug #7323: mqtt: wrong and missing direction for keywords
Bug #7318: flow: flow timeout pseudo packet triggers unexpected alert
Bug #7315: template: remove usage of template-rust
Bug #7314: misc/warnings: compile warnings during build
Bug #7309: http: incorrect file direction handling
Bug #7305: sdp: media's encryption key not logged
Bug #7303: detect: memleak in case of errors during initialization
Bug #7302: conf: memleak if yaml parser is initialized before checking if file
exists
Bug #7300: output: oversized records lead to invalid json
Bug #7296: detect: transform base64 creates a 0-sized variable-length array
Bug #7279: dns: protocol detection is not strict enough
Bug #7270: conf: nullptr dereference if mem alloc fails for a node in yaml parser
Bug #7264: detect/flow: ACK with data on 3whs fails to match 'flow:established'
Bug #7256: ja3: Error: ja3: Buffer should not be NULL
Bug #7253: fuzz: CIFuzz is not fuzzing PRs as it is supposed to
Bug #7241: app-layer-protocol: negated matching false positive
Bug #7238: app-layer: protocol flows are miscounted in case of error
Bug #7235: tls: a rule stops working since 7.0.5
Bug #7230: dcerpc: invalid dcerpc header is not rejected
Bug #7228: dns: no data logged, and no events with udp corrupt additional record
Bug #7226: lua: use crate from crates.io instead of github to fix offline builds
Bug #7218: profiling: packet profiling to log file is only active with rule
profiling
Bug #7213: frames: stream frame is not always the first one registered
Bug #7210: docs: inconsistent spelling in documentation for RFB
`security_result` key
Bug #7206: cbindgen: comptability with newer version 0.27
Bug #7200: smtp: crash in ByteExtractString
Bug #7199: detect: missing app-layer metadata in alerts
Bug #7187: detect: dcerpc logging and matching issues
Bug #7181: fuzz: File confyaml.c is missing
Bug #7176: ldap: crash when encountering GAP
Bug #7172: detect/integers: do not bother to free NULL pointer on setup/parse
failure
Bug #7169: lua/output: vendored lua search for modules in /usr/local/ rather
than /usr/
Bug #7158: tcp: 'broken ack' event set on flow timeout
Bug #7135: util/thash: debug assertion for memuse
Bug #7126: decode/base64: Error message on packet path.
Bug #7121: smb/ntlmssp: nonsense smb.ntlmssp.version values
Bug #7115: dpdk: timestamping packets through TSC does not yield the same time
as kernel time
Bug #7113: pgsql: track 'progress' in tx per direction
Bug #7111: protodetect: DNS flow direction is not correct sometimes
Bug #7106: packet: app-layer-events incorrectly used on recycled packets
Bug #7093: sip: wrong slice used for sip_take_line with tcp leads to quadratic
oom
Bug #7059: smtp: split name logged as 2 names
Bug #7053: bypass: cannot bypass udp flow from first packet in second direction
Bug #7049: util/radix-tree: Possible dereference of nullptr in case of
unsuccess allocation of memory for node
Bug #7048: af-packet: failure to start up on many threads plus high load
Bug #7037: pcap/log: MacOS rotates file well before limit is reached
Bug #7034: time: in offline mode, time can stay behind at pcap start
Bug #7028: base64: heap buffer overflow in RFC 2045 and 4648 modes
Bug #7025: websocket: wrong value for opcode ping/pong
Bug #7022: unix-socket: iface-bypassed-stat crash
Bug #7020: unix-socket: hostbit commands don't properly release host
Bug #7013: rust: build with rust 1.78 with slice::from_raw_parts now requiring
the pointer to be non-null
Bug #7000: pgsql: trigger raw stream reassembly
Bug #6994: sip/sdp: logget closes unopened array for empty medias
Bug #6989: tls.random buffers don't work as expected
Bug #6985: base64: coverity dead code warning
Bug #6984: mqtt: do not log non-string messages?
Bug #6983: eve/alert/metadata: no pgsql object encapsulation
Bug #6973: detect: log relevant frames app-layer metdata
Bug #6969: dataset: lookup function is not working with ip type
Bug #6964: base64: consumed bytes are incorrectly set for different modes
Bug #6959: http: improve handling of content encoding: gzip but request_body
not actually compressed
Bug #6957: Assert: BUG_ON(id <= 0 || id > (int)thread_store.threads_size);
Bug #6954: eve: packet field packet_info.linktype is non-portable
Bug #6948: detect/http.response_body: false positive because not enforcing
direction to_client
Bug #6942: decode/ppp: decoder.event.ppp.wrong_type on valid packet
Bug #6940: lua: handle errors in lua rules
Bug #6921: jsonbuilder: serializes Rust f64 NaNs to an invalid literal
Bug #6918: pcre2: compile warning
Bug #6913: reimplement systemd sd_notify w/o linking to libsystemd
Bug #6906: smtp/mime: data command rejected by pipelining server does not
reset data mode
Bug #6904: mime: buffer overflow in GetFullValue() (util-decode-mime.c)
Bug #6903: streaming buffer: heap overflows in
StreamingBufferAppend()/StreamingBufferAppendNoTrack()
Bug #6896: detect/port: upper boundary ports are not correctly handled
Bug #6891: sip: usage of Vec instead of Vecdeque leads to quadratic complexity
on cleanup
Bug #6889: detect: slowdown in rule parsing
Bug #6887: defrag: reassembled packet can have wrong datatype
Bug #6883: rust: clippy 1.77 warning
Bug #6881: detect/port: port grouping does not happen correctly if gap between
a single and range port
Bug #6877: Suricata 8 general protection fault ip:698117 sp:7fd537b08090
Bug #6875: output/alert: assertion failed p->flow != NULL
Bug #6871: dpdk: fix compatibility issues for ice cards
Bug #6864: detect: ipopts keyword false positive
Bug #6861: profiling/rules: crash when profiling ends
Bug #6846: eve/alerts: wrongly using tx id 0 when there is no tx
Bug #6843: detect/port: port ranges are incorrect when a port is single as
well as a part of range
Bug #6839: coverity: warning in port grouping code
Bug #6838: eve/filetypes: move from plugin api to eve api
Bug #6837: netmap: error message Netmap pipes (with lb)
Bug #6835: BUG_ON triggered from TmThreadsInjectFlowById
Bug #6834: iprep: rule with '=,0' can't match
Bug #6811: capture plugins: capture plugins unusable due to initialization order
Bug #6790: dpdk: evaluate the correct handling of DPDK ports on shutdown
Bug #6787: decode/pppoe: Suspicious pointer scaling
Bug #6782: streaming/buffer: crash in HTTP body handling
Bug #6778: detect/tls.certs: direction flag checked against wrong field
Bug #6766: multi-tenancy: dead lock during tenant loading
Bug #6762: hugepages: error for FreeBSD when kernel NUMA build option is not
enabled
Bug #6760: af-packet: hugepages Error for ARM64 and af-packet IPS mode
Bug #6755: netmap: deadlock if netmap_open fails
Bug #6753: detect/cip: missing return-value check for a 'scanf'-like function
Bug #6745: util/mime: Memory leak at util-decode-mime.c:MimeDecInitParser
Bug #6741: dpdk: automatic cache calculation is broken
Bug #6737: dpdk: property configuration can lead to integer overflow
Bug #6733: tcp: tcp flow flags changing incorrectly when ruleset contains
content matching
Bug #6732: eve/stats: parent interface object in stats contains VLAN-ID as keys
Bug #6726: stream: stream.drop-invalid drops valid traffic
Bug #6715: dpdk: NUMA warning on non-NUMA system
Bug #6710: rules: failed rules after a skipped rule are recorded as skipped,
not failed
Bug #6678: datasets: discard datasets that hit the memcap while loading correctly
Bug #6664: eve/smtp: attachment filenames not logged
Bug #6661: detect/content-inspect: FN on negative distance
Bug #6656: detect/requires: assertion failed !(ret == -4)
Bug #6643: http: wrongly assuming http0.9 leads to missed headers
Bug #6634: tls: Invalid ja3 due to double client hello
Bug #6633: stats: flows with a detection-only alproto not accounted in this
protocol
Bug #6619: profiling: runtime much longer to run than it used to
Bug #6618: endace: timestamp fixes
Bug #6617: detect/filestore: flow, to_server was broken by moving files into
transactions
Bug #6615: detect/analyzer: misrepresenting negative distance value
Bug #6592: mqtt: frames on TCP are not set properly when parsing multiple PDUs
in one go
Bug #6585: src: SCTIME_FROM_TIMESPEC() creates incorrect timestamps
Bug #6584: src: SCTIME_ADD_SECS() macro zeros out ts.usec part
Bug #6578: ssh: no alert on packet with Message Code: New Keys (21)
Bug #6574: detect/filestore: memory leak on rule parsing
Bug #6553: eve/alert: payload/payload_printable misrepresent data in case of
overlaps
Bug #6551: Invalid registration of prefiltering in stream size
Bug #6547: http2: http.response_line has leading space
Bug #6527: cppcheck 2.11 errors
Bug #6501: eve/alert: missing TFTP metadata
Bug #6500: eve/alert: missing FTP metadata
Bug #6490: profiling: rule profiling doesn't support absolute paths
Bug #6483: http.request_headers - odd behavior with multiple signtures
Bug #6419: dpdk: Analyze hugepage allocation on startup more thoroughly
Bug #6415: http: various header buffer not populated when malformed header
value exists
Bug #6414: detect-engine/port: recursive DetectPortInsert calls are expensive
Bug #6408: Output plugins receive identifier, but not thread identifier
Bug #6405: eve: ethernet src_mac should match src_ip
Bug #6398: eve/stats: threads object in stats contains memcap_pressure scalars
Bug #6393: detect/filestore: be more explicit about the U16_MAX limit per
signature group head
Bug #6390: detect/filestore: do not store if "both,flow" is triggered after
the file was set to "nostore"
Bug #6389: pgsql: u16 overflow found by oss-fuzz w/ quadfuzz
Bug #6376: detect: huge increase on start up time with a lot of ip-only rules
and bigger HOME_NET
Bug #6347: log-pcap: crash with suricata.yaml setting max-file to 1
Bug #6305: drop: assertion failed
!(PKT_IS_PSEUDOPKT(p)) && !PacketCheckAction(p, ACTION_DROP)
Bug #6304: schema.json : if protocol such as ENIP is detection only, we do not
have _tcp suffix in stats
Bug #6281: dns: structure of query differs between "alert" and "dns" event types
Bug #6280: base64: strict mode should only accept strings that can be reliably
converted back
Bug #6254: bypass: thread "FB" failed to start in time: flags 0003
Bug #6092: eve/alert: missing pgsql metadata
Bug #6080: pgsql/probe: TCP on 5432 traffic incorrectly tagged as PGSQL
Bug #5977: eve/alert: missing KRB5 metadata
Bug #5539: landlock: coverity warnings
Bug #5524: pgsql: parser should not error on parsing error, so as to keep on
parsing the next PDUs
Bug #5491: smtp: response 530 appears to generate an invalid response alert
Bug #5486: eve: ethernet metadata is missing for some protocols or parts of a
protocol
Bug #5279: nom: use of count combinator can use too much memory
Bug #5220: detect/base64_data: fast_pattern shouldn't be allowed
Bug #5185: mime: URL extraction missing
Bug #4921: detect/app-layer-protocol: unexpected results when one direction
state "failed"
Bug #4858: fuzz: Timeout with pcre
Bug #4734: pfring: memory leak
Bug #3910: datasets: for type string the memcap isn't applied to the string data
Bug #3682: detect/bsize: error for impossible matching conditions
Bug #2886: imap: protocol detection is incomplete
Bug #2881: http.protocol parsing inaccuracy : accept spaces in URI
Bug #2224: rules: negated http_* match returns false if buffer not populated
Bug #1457: conf: non-standard units used for file size indication
Optimization #7617: af-packet: set defrag based on passive or inline mode
Optimization #7558: detect: convert rule group dumping to JsonBuilder
Optimization #7358: CI: only run CodeQL python if the PR contains changed
files that are python
Optimization #7304: detect: improve support for multi-protocol keywords
Optimization #7297: src: remove duplicate function declarations
Optimization #7272: af-packet: improve startup time
Optimization #7208: tcp/reassemble: GetBlock takes O(nlgn) in worst case
Optimization #7185: stats: exceptions: use search-friendly log output
Optimization #7178: rfb: rustify keywords and app-layer registration
Optimization #7155: pcap: use larger read size buffer for a performance increase
Optimization #7087: app-layer: track modified transactions
Optimization #7065: base64: move the decoder to rust
Optimization #7044: app-layer: clean up truncate callbacks and logic
Optimization #7018: dns/tcp: allow triggering raw stream reassembly
Optimization #7002: detect: move pseudo packet checks out of keyword Match funcs
Optimization #6938: packet: optimize packet data storage
Optimization #6937: compile: make code clean with -Wunused-macros
Optimization #6878: conf: quadratic complexity in yaml loader
Optimization #6873: byte_extract: convert keyword/option parsing to Rust
Optimization #6855: src: var code cleanups
Optimization #6852: mpm/ac: support endswith
Optimization #6821: smtp: add 535 code
Optimization #6795: detect/port: PortGroupWhitelist fn takes a lot of
processing time
Optimization #6792: detect/port: port grouping is quite slow in worst cases
Optimization #6786: util-rohash.c : make code cleaner to make CodeQL happier
Optimization #6775: detect: do not run tx detection on tcp non established
packets
Optimization #6773: app-layer/template: no limit on txs number
Optimization #6728: detect: prefilter for events (decode, stream, app-layer,
etc...)
Optimization #6718: detect/frames: avoid rescanning in IPS mode
Optimization #6702: streaming-buffer: Explore Rank Balanced trees
Optimization #6575: detect/multi-buffer: use single definition of struct
PrefilterMpmKrb5Name
Optimization #6569: threading: fix condition signalling w/o taking lock first
Optimization #6454: detect: force os to release memory on rule reload
Optimization #6433: packetpool: improve return sync logic
Optimization #6387: mqtt: move parser registration code to the rust side
Optimization #6111: defrag: avoid passing null pointers to functions
Optimization #5699: dcerpc: switch to incomplete api for tcp
Optimization #5672: smb: avoid unbounded hash maps
Optimization #5634: detect: unify ValidateCallback for MD5-like keywords
Optimization #5566: pgsql: add events
Optimization #5517: decode: big clean up (macros and functions)
Optimization #5311: ftp: use unsigned integer for input_len
Optimization #5047: sip: implement pattern based protocol detection
Optimization #4798: af-packet: default to tpacket-v3 in IDS mode
Optimization #3827: output: clean up logging initialization code
Optimization #3449: eve: output calls fflush very often
Optimization #3427: datasets: issue warning/info for data with type string
that are not base64
Optimization #426: threshold: rule based thresholding data structure improvement
Task #7604: lua: turn http into lib
Task #7602: lua: turn dns into lib
Task #7601: lua: turn dnp3 into lib
Task #7492: lua: remove script_api_ver check from needs block
Task #7489: lua: turn flow into lib
Task #7488: lua: turn packet into lib
Task #7456: engine/analysis: report rule state altered by flowbit rule
Task #7426: flowint: add isnotset support
Task #7350: firewall usecase: log app-layer metadata for for catch-all drop rules
Task #7341: rust: use bindgen to generate Rust bindings to C functions
Task #7287: schema: add missing tls fields certificate and chain
Task #7246: libhtp 0.5.49
Task #7227: logging: document and cleanup low level logging registration
Task #7219: rust/crates: update base64
Task #7167: dns: make the version field in a dns object required
Task #7165: napatech: move into bundled plugin
Task #7162: pfring: move into bundled plugin
Task #7154: plugins: add template detection plugin
Task #7152: plugins: add template logger plugin
Task #7151: plugins: add template app-layer plugin
Task #7130: rust: dependency "time" fails to build on Rust nightly
Task #7058: fuzz/base64: check decoded strings for correctness in strict mode
Task #6965: libhtp 0.5.48
Task #6962: yaml: unify 0 stats counter config option terminology
Task #6961: lua: use a rust crate to vendor lua
Task #6935: unittests: convert tests to new FAIL/PASS API - src/app-layer-htp.c
Task #6888: contrib: remove obsolete items from contrib
Task #6818: rust: snmp-parser 0.10.0
Task #6817: rust: kerberos-parser 0.8.0
Task #6769: libhtp 0.5.47
Task #6748: doc: mention X710 RX descriptor limitation
Task #6712: dependencies: completely remove nss
Task #6705: build-info: remove obsolete "rust support" line
Task #6605: flash decompression: update/remove deprecation warnings
Task #6603: pgsql: don't log password msg if password disabled
Task #6586: mpm/ac-bs: remove implementation
Task #6577: pgsql: add cancel request message
Task #6544: logging: deprecate syslog
Task #6543: logging: deprecate http-log
Task #6542: logging: deprecate tls-log
Task #6488: plugins: add example plugins to the suricata source tree
Task #6432: tracking: autofp capture stalls due to packetpool depletion
Task #6427: runmodes: remove reference to auto modes
Task #6360: detect/analyzer: add more details for the icmp_id keyword
Task #6355: detect/analyzer: add more details for the tcp.mss keyword
Task #6354: detect/analyzer: add more details for the tcp ack keyword
Task #6353: detect/analyzer: add more details for the tcp seq keyword
Task #6352: detect/analyzer: add more details for the tcp window keyword
Task #6318: unittests: convert tests to new
FAIL/PASS API - detect-engine-address-ipv4.c
Task #6312: detect/analyzer: add more details for the flow.age keyword
Task #6309: detect/analyzer: add more details for the flowbits keyword
Task #6287: suricatasc: rewrite in rust
Task #6209: libhtp 0.5.46
Task #6107: unittests: convert tests to new FAIL/PASS API - util-memcmp.c
Task #6050: base64: make a fuzz target
Task #5626: doc: document file.data
Task #5588: ips/tap: don't allow mixed tap and ips modes
Task #5053: app-layer: dynamic alproto IDs
Task #4742: build: make the auto-generated config.h not conflict with other
config.h
Task #4698: lib: Example program to bootstrap Suricata (an alternate main()
for Suricata)
Task #4683: detect: remove sigmatch_table in favor of a dynamic storage option
Task #4105: plugins: Create template capture source plugin
Task #4103: plugins: convert an app-layer to use the plugin API (snmp)
Documentation #7540: doc/userguide: fix typo
Documentation #7383: userguide: fix typo
Documentation #7262: doc: remove mentions to suricata-6
Documentation #7260: userguide/config: fix consistency of dashes instead of
underscores
Documentation #7153: devguide: document adding a detection plugin
Documentation #7150: devguide: document adding a logging plugin
Documentation #7149: devguide: document adding a app-layer plugin
Documentation #7031: userguide: document SignatureProperties sigtype
Documentation #6911: manpages: use consistant date based on release and/or git
commits
Documentation #6908: userguide: document how to verify tar.gz signature
Documentation #6781: http: document duplicate headers concatenation handling
Documentation #6725: document pcap file variables
Documentation #6708: userguide/payload: fix explanation about bsize ranges
Documentation #6686: docs: port userguide build instruction changes from
master-6.0.x
Documentation #6685: userguide: explain noalert keyword
Documentation #6629: docs: fix byte_test examples
Documentation #6628: userguide: document generic aspects of integer keywords
Documentation #6599: docs: update eBPF installation instructions
Documentation #6589: docs: fix broken bulleted list style on rtd
Documentation #6570: remove references in docs mentioning prehistoric Suricata
versions
Documentation #6568: devguide: document backports policies and process
Documentation #6552: doc: add tcp timeout fix to upgrade guide
Documentation #6548: http2: http.stat_msg - note about HTTP/2 behavior
Documentation #6445: userguide: explain what flow_id is
Documentation #6076: eve/schema: document quic
Documentation #5651: detect/bsize: format should specify operators
Documentation #5494: userguide: update tls eve-log fields 'not_before' and
'not_after'
Documentation #5393: devguide: move github workflow document from redmine into
devguide
Documentation #5088: detect/file.name: keyword is not documented
Documentation #4359: docs: elaborate documentation for rule profiling
Documentation #3015: userguide: document "tag" keyword
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Adolf Belka [Thu, 7 Aug 2025 15:22:45 +0000 (17:22 +0200)]
bash: Update to patch level 3
- Update from patch level 0 to 3
- Update of rootfile not required
- Changelog
Patch 3
Bash leaves internal quoting in place when expanding array subscripts
that appear inside array subscripts in an arithmetic context, causing
expansion failures.
Patch 2
There are too many differences in the various implementations of shm_open(2)
to rely on it for bash's use.
Patch 1
In posix mode, `wait -n' with pid arguments does not restrict the set of
processes it considers to those arguments.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>