From: Shivani Bhardwaj Date: Tue, 18 Mar 2025 12:19:32 +0000 (+0530) Subject: release: 7.0.9; update changelog X-Git-Tag: suricata-7.0.9^0 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=76729e42663da010d6fcc4d13d38215344853a23;p=thirdparty%2Fsuricata.git release: 7.0.9; update changelog --- diff --git a/ChangeLog b/ChangeLog index bebd50ff4b..c959fa81da 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,23 @@ +7.0.9 -- 2025-03-18 + +Security #7616: datasets: hashsize setting via rules can cause high memory usage (7.0.x backport)(MODERATE - CVE 2025-29916) +Security #7614: decode_base64: signature can do large memory allocation (7.0.x backport)(HIGH - CVE 2025-29917) +Security #7527: detect: infinite loop with negated pcre and indefinite recursion limit setting (7.0.x backport)(HIGH - CVE 2025-29918) +Security #7459: af-packet: defrag option can lead to truncated packets (7.0.x backport)(HIGH - CVE 2025-29915) +Bug #7581: detect: missing file.data matches without filestore (7.0.x backport) +Bug #7561: detect: integer underflow with krb5.ticket_encryption (7.0.x backport) +Bug #7557: quic: valid traffic blocked in IPS mode (7.0.x backport) +Bug #7555: tls: parser error on unACK'd data in FIN shutdown (7.0.x backport) +Bug #7553: applayer: misdetection if response is seen first without request (7.0.x backport) +Bug #7496: detect: protocol probing doesn't finish earlier if opposite dir already had a protocol (7.0.x backport) +Bug #7493: flow/var: memory leak in lua extension (7.0.x backport) +Bug #7468: detect: checksum detection broken by stream.checksum-validation (7.0.x backport) +Bug #7460: eve: empty src_ip and dest_ip values may be logged +Bug #7448: log/file: nullptr dereference if file was opened more than once (7.0.x backport) +Bug #7431: flow: multiple Flow Managers scan wrong hash slices (7.0.x backport) +Bug #7428: tcp: GAP event set on unack'd data following a RST (7.0.x backport) +Optimization #7088: applayer: track modified transactions to avoid walking all live transactions (7.0.x backport) + 7.0.8 -- 2024-12-12 Security #7412: tcp: generic detection bypass using TCP urgent support (7.0.x backport)(HIGH - CVE 2024-55629) diff --git a/configure.ac b/configure.ac index 44f75453e1..65e9283c47 100644 --- a/configure.ac +++ b/configure.ac @@ -1,4 +1,4 @@ - AC_INIT([suricata],[7.0.9-dev]) + AC_INIT([suricata],[7.0.9]) m4_ifndef([AM_SILENT_RULES], [m4_define([AM_SILENT_RULES],[])])AM_SILENT_RULES([yes]) AC_CONFIG_HEADERS([src/autoconf.h]) AC_CONFIG_SRCDIR([src/suricata.c]) @@ -1580,12 +1580,12 @@ echo exit 1 fi - PKG_CHECK_MODULES(LIBHTPMINVERSION, [htp >= 0.5.49],[libhtp_minver_found="yes"],[libhtp_minver_found="no"]) + PKG_CHECK_MODULES(LIBHTPMINVERSION, [htp >= 0.5.50],[libhtp_minver_found="yes"],[libhtp_minver_found="no"]) if test "$libhtp_minver_found" = "no"; then PKG_CHECK_MODULES(LIBHTPDEVVERSION, [htp = 0.5.X],[libhtp_devver_found="yes"],[libhtp_devver_found="no"]) if test "$libhtp_devver_found" = "no"; then echo - echo " ERROR! libhtp was found but it is neither >= 0.5.49, nor the dev 0.5.X" + echo " ERROR! libhtp was found but it is neither >= 0.5.50, nor the dev 0.5.X" echo exit 1 fi diff --git a/requirements.txt b/requirements.txt index 6df1358f07..4b1e8145ac 100644 --- a/requirements.txt +++ b/requirements.txt @@ -3,5 +3,5 @@ # Format: # # name {repo} {branch|tag} -libhtp https://github.com/OISF/libhtp 0.5.x -suricata-update https://github.com/OISF/suricata-update master +libhtp https://github.com/OISF/libhtp 0.5.50 +suricata-update https://github.com/OISF/suricata-update 1.3.4