Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Next/20220523/v1 #7423

Merged
merged 8 commits into from
May 24, 2022
Merged

Next/20220523/v1 #7423

merged 8 commits into from
May 24, 2022

Conversation

catenacyber and others added 8 commits May 17, 2022 10:41
Do not mask protocols on both directions with only first packet

For instance :
When the first packet is no valid DNS but on port 53 (a junk request)
second packet (error response from server) does not get checked for DNS
as first packet bit masked away DNS for both directions

Ticket: OISF#2757
As is already done for TCP

Ticket: OISF#2757
Bumps [actions/upload-artifact](https://github.com/actions/upload-artifact) from 3.0.0 to 3.1.0.
- [Release notes](https://github.com/actions/upload-artifact/releases)
- [Commits](actions/upload-artifact@6673cd0...3cea537)

---
updated-dependencies:
- dependency-name: actions/upload-artifact
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 2.1.9 to 2.1.11.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@7502d6e...a3a6c12)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
In the unlikely case of AlertQueueExpand failure, we were incrementing
the discarded alerts stats in AlertQueueAppend via the Packet member in the
DetectEngineThreadCtx, which may not be initialized yet.

Bug OISF#5353
When reloading rules, respect `--set default-rule-path=...` from the
command line if set.

Previously the rule reload would always take the default-rule-path from
the configuration file, even if overrided on the command line.

Issue: OISF#1911
35 -> 36
34 -> 35
33 -> 34
@victorjulien victorjulien requested review from jasonish and a team as code owners May 23, 2022 20:02
@codecov
Copy link

codecov bot commented May 23, 2022

Codecov Report

Merging #7423 (49647ad) into master (b6407c4) will decrease coverage by 0.01%.
The diff coverage is 77.08%.

@@            Coverage Diff             @@
##           master    #7423      +/-   ##
==========================================
- Coverage   75.94%   75.92%   -0.02%     
==========================================
  Files         656      656              
  Lines      189916   189942      +26     
==========================================
- Hits       144233   144219      -14     
- Misses      45683    45723      +40     
Flag Coverage Δ
fuzzcorpus 60.57% <75.55%> (-0.08%) ⬇️
suricata-verify 51.89% <80.00%> (-0.01%) ⬇️
unittests 61.07% <5.00%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

@suricata-qa
Copy link

ERROR:

ERROR: QA failed on tlpw1_files_sha256.

ERROR: QA failed on tlpr1_alerts_cmp.

Pipeline 7513

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

5 participants