[Oisf-devel] [COMMIT] OISF branch, master, updated. suricata-2.0rc1-71-g606e191

OISF Git noreply at openinfosecfoundation.org
Wed Mar 5 09:26:47 UTC 2014

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".

The branch, master has been updated
       via  606e19124b3417d3bf1faa3a72eeef844eda658e (commit)
       via  f00703acc1b75a4e402c96995724f91fa6bda141 (commit)
      from  00d2f2d627bfe3eb1245dda28033a459fb55de27 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 606e19124b3417d3bf1faa3a72eeef844eda658e
Author: Eric Leblond <eric at regit.org>
Date:   Mon Mar 3 17:57:10 2014 +0100

    http: add info message about memcap
    Display a message about http memcap when it is set in config file.

commit f00703acc1b75a4e402c96995724f91fa6bda141
Author: Victor Julien <victor at inliniac.net>
Date:   Tue Mar 4 17:49:36 2014 +0100

    Fix False Positive of rules with ports on portless protocols
    In case of 'alert ip' rules that have ports, the port checks would
    be bypassed for non-port protocols, such as ICMP. This would lead to
    a rule matching: a false positive.
    This patch adds a check. If the rule has a port setting other than
    'any' and the protocol is not TCP, UDP or SCTP, then we rule won't
    Rules with 'alert ip' and ports are rare, so the impact should be
    Bug #611.


Summary of changes:
 src/app-layer-htp-mem.c |    1 +
 src/detect.c            |   57 +++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 58 insertions(+)


More information about the Oisf-devel mailing list