[Oisf-devel] [COMMIT] OISF branch, master, updated. suricata-2.0rc1-71-g606e191
OISF Git
noreply at openinfosecfoundation.org
Wed Mar 5 09:26:47 UTC 2014
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".
The branch, master has been updated
via 606e19124b3417d3bf1faa3a72eeef844eda658e (commit)
via f00703acc1b75a4e402c96995724f91fa6bda141 (commit)
from 00d2f2d627bfe3eb1245dda28033a459fb55de27 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit 606e19124b3417d3bf1faa3a72eeef844eda658e
Author: Eric Leblond <eric at regit.org>
Date: Mon Mar 3 17:57:10 2014 +0100
http: add info message about memcap
Display a message about http memcap when it is set in config file.
commit f00703acc1b75a4e402c96995724f91fa6bda141
Author: Victor Julien <victor at inliniac.net>
Date: Tue Mar 4 17:49:36 2014 +0100
Fix False Positive of rules with ports on portless protocols
In case of 'alert ip' rules that have ports, the port checks would
be bypassed for non-port protocols, such as ICMP. This would lead to
a rule matching: a false positive.
This patch adds a check. If the rule has a port setting other than
'any' and the protocol is not TCP, UDP or SCTP, then we rule won't
match.
Rules with 'alert ip' and ports are rare, so the impact should be
minimal.
Bug #611.
-----------------------------------------------------------------------
Summary of changes:
src/app-layer-htp-mem.c | 1 +
src/detect.c | 57 +++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 58 insertions(+)
hooks/post-receive
--
OISF
More information about the Oisf-devel
mailing list