Skip to content

Commit 76729e4

Browse files
committed
release: 7.0.9; update changelog
1 parent f6140df commit 76729e4

File tree

3 files changed

+25
-5
lines changed

3 files changed

+25
-5
lines changed

ChangeLog

+20
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,23 @@
1+
7.0.9 -- 2025-03-18
2+
3+
Security #7616: datasets: hashsize setting via rules can cause high memory usage (7.0.x backport)(MODERATE - CVE 2025-29916)
4+
Security #7614: decode_base64: signature can do large memory allocation (7.0.x backport)(HIGH - CVE 2025-29917)
5+
Security #7527: detect: infinite loop with negated pcre and indefinite recursion limit setting (7.0.x backport)(HIGH - CVE 2025-29918)
6+
Security #7459: af-packet: defrag option can lead to truncated packets (7.0.x backport)(HIGH - CVE 2025-29915)
7+
Bug #7581: detect: missing file.data matches without filestore (7.0.x backport)
8+
Bug #7561: detect: integer underflow with krb5.ticket_encryption (7.0.x backport)
9+
Bug #7557: quic: valid traffic blocked in IPS mode (7.0.x backport)
10+
Bug #7555: tls: parser error on unACK'd data in FIN shutdown (7.0.x backport)
11+
Bug #7553: applayer: misdetection if response is seen first without request (7.0.x backport)
12+
Bug #7496: detect: protocol probing doesn't finish earlier if opposite dir already had a protocol (7.0.x backport)
13+
Bug #7493: flow/var: memory leak in lua extension (7.0.x backport)
14+
Bug #7468: detect: checksum detection broken by stream.checksum-validation (7.0.x backport)
15+
Bug #7460: eve: empty src_ip and dest_ip values may be logged
16+
Bug #7448: log/file: nullptr dereference if file was opened more than once (7.0.x backport)
17+
Bug #7431: flow: multiple Flow Managers scan wrong hash slices (7.0.x backport)
18+
Bug #7428: tcp: GAP event set on unack'd data following a RST (7.0.x backport)
19+
Optimization #7088: applayer: track modified transactions to avoid walking all live transactions (7.0.x backport)
20+
121
7.0.8 -- 2024-12-12
222

323
Security #7412: tcp: generic detection bypass using TCP urgent support (7.0.x backport)(HIGH - CVE 2024-55629)

configure.ac

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
AC_INIT([suricata],[7.0.9-dev])
1+
AC_INIT([suricata],[7.0.9])
22
m4_ifndef([AM_SILENT_RULES], [m4_define([AM_SILENT_RULES],[])])AM_SILENT_RULES([yes])
33
AC_CONFIG_HEADERS([src/autoconf.h])
44
AC_CONFIG_SRCDIR([src/suricata.c])
@@ -1580,12 +1580,12 @@
15801580
echo
15811581
exit 1
15821582
fi
1583-
PKG_CHECK_MODULES(LIBHTPMINVERSION, [htp >= 0.5.49],[libhtp_minver_found="yes"],[libhtp_minver_found="no"])
1583+
PKG_CHECK_MODULES(LIBHTPMINVERSION, [htp >= 0.5.50],[libhtp_minver_found="yes"],[libhtp_minver_found="no"])
15841584
if test "$libhtp_minver_found" = "no"; then
15851585
PKG_CHECK_MODULES(LIBHTPDEVVERSION, [htp = 0.5.X],[libhtp_devver_found="yes"],[libhtp_devver_found="no"])
15861586
if test "$libhtp_devver_found" = "no"; then
15871587
echo
1588-
echo " ERROR! libhtp was found but it is neither >= 0.5.49, nor the dev 0.5.X"
1588+
echo " ERROR! libhtp was found but it is neither >= 0.5.50, nor the dev 0.5.X"
15891589
echo
15901590
exit 1
15911591
fi

requirements.txt

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,5 @@
33
# Format:
44
#
55
# name {repo} {branch|tag}
6-
libhtp https://github.com/OISF/libhtp 0.5.x
7-
suricata-update https://github.com/OISF/suricata-update master
6+
libhtp https://github.com/OISF/libhtp 0.5.50
7+
suricata-update https://github.com/OISF/suricata-update 1.3.4

0 commit comments

Comments
 (0)