[Oisf-devel] [COMMIT] OISF branch, master-3.2.x, updated. suricata-3.2.4-13-g7608206

OISF Git noreply at openinfosecfoundation.org
Mon Dec 4 15:59:38 UTC 2017


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".

The branch, master-3.2.x has been updated
       via  7608206ccedd0f2a878b7e30f59cb0eb3c77a42a (commit)
       via  dd015669c7e553491110e5698555116ea3028d00 (commit)
       via  2a1a664f3c8f6587a80109f41b6a8d28a4423f7c (commit)
       via  34e6ad02f231207de438c37c0ba5161c77967842 (commit)
       via  14bf32c031febef495f7caa7ea1d1079bf20880a (commit)
       via  12c880a7783831fde3fbfdc1a3954e2b801bdb23 (commit)
       via  6aafca25ff3396885a572f2c3a7b8ea02a06df20 (commit)
       via  9d77ad50cbd86469f41e7f686675685c6c4555de (commit)
       via  393db61706236364c7b323b5f9fed07225ddfd4c (commit)
       via  723e23dd6781356d20e3f6e4c0b7ed593c126afd (commit)
       via  b6617ede047d4ccd495db6346aa252a615d764ee (commit)
       via  148d6e9fb7845669ecf748a063d5b9a2a34aa6c7 (commit)
       via  f8a4848e986edaa722d38bd3bb87ca4a4d0a59e2 (commit)
      from  055c054b8e71c660dc7f13a446931ad3ca70ba9d (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 7608206ccedd0f2a878b7e30f59cb0eb3c77a42a
Author: Victor Julien <victor at inliniac.net>
Date:   Sun Dec 3 22:10:37 2017 +0100

    hosts: release packet references to hosts

commit dd015669c7e553491110e5698555116ea3028d00
Author: Victor Julien <victor at inliniac.net>
Date:   Thu Nov 30 08:04:48 2017 +0100

    detect/flowint: harden code
    
    Make sure packet has a flow.
    
    Related to bug #2288.

commit 2a1a664f3c8f6587a80109f41b6a8d28a4423f7c
Author: Victor Julien <victor at inliniac.net>
Date:   Thu Nov 30 09:07:40 2017 +0100

    detect/flowint: improve unittests
    
    In preparation of fixing bug #2288, make sure the unittests setup
    the flow in the packet properly.

commit 34e6ad02f231207de438c37c0ba5161c77967842
Author: Victor Julien <victor at inliniac.net>
Date:   Thu Nov 30 09:07:20 2017 +0100

    unittest/helpers: add helper to assign flow to packet

commit 14bf32c031febef495f7caa7ea1d1079bf20880a
Author: Victor Julien <victor at inliniac.net>
Date:   Tue Nov 28 10:28:07 2017 +0100

    detect/depth: reject rules with depth smaller than content

commit 12c880a7783831fde3fbfdc1a3954e2b801bdb23
Author: Victor Julien <victor at inliniac.net>
Date:   Mon Nov 27 10:03:46 2017 +0100

    http: allow shinking in HTPRealloc

commit 6aafca25ff3396885a572f2c3a7b8ea02a06df20
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Sun Nov 19 14:05:04 2017 +0000

    conf: fix NULL-pointer dereference in CoredumpLoadConfig
    
    An empty value for coredump.max-dump in the config-file leads to a segfault because of a NULL-pointer dereference in CoredumpLoadConfig().
    
    Here is a configuration example:
    
    coredump.max-dump: []
    
    This lets suricata crash with a segfault:
    
    ASAN-output:
    ==9412==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f22e851aa28 bp 0x7ffd90006fc0 sp 0x7ffd90006740 T0)
        0 0x7f22e851aa27 in strcasecmp (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x51a27)
        1 0x5608a7ec0108 in CoredumpLoadConfig /root/suricata-1/src/util-coredump-config.c:52
        2 0x5608a7e8bb22 in PostConfLoadedSetup /root/suricata-1/src/suricata.c:2752
        3 0x5608a7e8c577 in main /root/suricata-1/src/suricata.c:2892
        4 0x7f22e4c622b0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x202b0)
        5 0x5608a7a30c59 in _start (/usr/local/bin/suricata+0xc4c59)
    
    Bug #2276

commit 9d77ad50cbd86469f41e7f686675685c6c4555de
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Fri Nov 17 23:25:08 2017 +0000

    conf: fix NULL-pointer dereference in ConfGetInt
    
    If there are empty values in the config-file where integer values are expected, strtoimax in the ConfGetInt-function will segfault because of NULL-pointer dereference.
    
    Here is a configuration example:
    
    pcre.match-limit: []
    
    This will let suricata crash with a segfault.
    ASAN-output:
    
    ASAN:DEADLYSIGNAL =================================================================
    16951ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fa690e3ccc5 bp 0x000000000000 sp 0x7ffd0d770ad0 T0)
    0 0x7fa690e3ccc4 (/lib/x86_64-linux-gnu/libc.so.6+0x36cc4)
    1 0x7fa6946a6534 in strtoimax (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x44534)
    2 0x55e0aeba6499 in ConfGetInt /root/suricata-1/src/conf.c:390
    3 0x55e0aed2545d in DetectPcreRegister /root/suricata-1/src/detect-pcre.c:99
    4 0x55e0aec1b4ce in SigTableSetup /root/suricata-1/src/detect.c:3783
    5 0x55e0aeeed58d in PostConfLoadedSetup /root/suricata-1/src/suricata.c:2690
    6 0x55e0aeeee4f2 in main /root/suricata-1/src/suricata.c:2892
    7 0x7fa690e262b0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x202b0)
    8 0x55e0aea92d39 in _start (/usr/local/bin/suricata+0xc7d39)
    
    AddressSanitizer can not provide additional info.
    SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x36cc4)
    
    This commit fixes Ticket #2275

commit 393db61706236364c7b323b5f9fed07225ddfd4c
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Fri Nov 17 17:47:41 2017 +0000

    conf: fix NULL-pointer dereference in ParseSizeString
    
    If someone accidently writes invalid characters in some parts of the suricata.yaml-configfile, the size-parameter of the ParseSizeString-function becomes NULL and gets dereferenced. Suricata crashes with SEGV. This commit fixes Ticket #2274
    
    The following config value leads to a Segfault:
    app-layer.protocols.smtp.inspected-tracker.content-inspect-window: *4096

commit 723e23dd6781356d20e3f6e4c0b7ed593c126afd
Author: Peter Manev <pmanev at stamus-networks.com>
Date:   Wed Nov 1 13:19:21 2017 +0100

    valgrind: suppressions for NIC offloading calls

commit b6617ede047d4ccd495db6346aa252a615d764ee
Author: Victor Julien <victor at inliniac.net>
Date:   Sat Oct 21 10:16:30 2017 +0200

    detect: handle very large byte_extract'ed values in isdataat

commit 148d6e9fb7845669ecf748a063d5b9a2a34aa6c7
Author: Victor Julien <victor at inliniac.net>
Date:   Sat Oct 21 10:00:47 2017 +0200

    detect: implement byte_extract support for isdataat

commit f8a4848e986edaa722d38bd3bb87ca4a4d0a59e2
Author: Victor Julien <victor at inliniac.net>
Date:   Sat Oct 21 10:00:08 2017 +0200

    detect: add debug statements for byte_extract/isdataat

-----------------------------------------------------------------------

Summary of changes:
 qa/valgrind.suppress                   | 15 ++++++++++++++-
 src/app-layer-htp-mem.c                | 16 ++++++++++------
 src/conf.c                             |  6 ++++++
 src/detect-byte-extract.c              |  2 +-
 src/detect-depth.c                     |  6 ++++++
 src/detect-engine-content-inspection.c | 25 ++++++++++++++++++++-----
 src/detect-flowint.c                   | 25 ++++++++++++++-----------
 src/detect-isdataat.c                  |  1 +
 src/flow-var.c                         |  3 +++
 src/tmqh-packetpool.c                  |  6 ++----
 src/util-coredump-config.c             |  4 ++++
 src/util-misc.c                        | 12 ++++++++++++
 src/util-unittest-helper.c             |  8 ++++++++
 src/util-unittest-helper.h             |  1 +
 14 files changed, 102 insertions(+), 28 deletions(-)


hooks/post-receive
-- 
OISF


More information about the Oisf-devel mailing list