We are pleased to announce Suricata 3.2.2. This release fixes a fairly small number of issues.
It also improves the unix-socket runmode by allowing both ‘single’ and ‘autofp’ runmodes to be specified.
- Feature #1675: Support additional runmodes for unix-socket
- Bug #2043: 3.2.x backport: make install-full can have race conditions on OSX.
- Bug #2047: af-packet: faulty VLAN handling in tpacket-v3 mode (3.2.x)
- Bug #2048: bad checksum 0xffff (3.2.x)
- Bug #2052: ippair: xbit unset memory leak (3.2.x)
- Bug #2071: file store: file log / file store mismatch with multiple files (3.2.x)
- Bug #2073: app-layer: fix memleak on bad traffic (3.2.x)
- Bug #2079: http body handling: failed assertion (3.2.x)
- Bug #2085: ippair: pair is direction sensitive (3.2.x)
- Bug #2119: 3.2.x – defrag – overlap issue in linux policy
- Bug #2122: unix socket: race condition on start up (3.2.x)
Jérémy Beaume, Alexander Gozman, Zoltan Herczeg and Jon Zeolla
- User Training in Denver, Colorado. June 20 and 21: https://www.eventbrite.com/e/2-day-suricata-training-in-denver-co-tickets-34071732469 Hosted by ProtectWise.
- Developer Training in Cork, Ireland. September 11 to 15: https://www.eventbrite.com/e/5-day-suricata-developer-training-ireland-tickets-33676049972 Hosted by FireEye.
- User Training at SuriCon 2017, in Prague: https://www.eventbrite.com/e/2-day-suricata-training-suricon-2017-tickets-32303327121
Come meet the Suricata community and development team to discuss all things Suricata at the third edition of the annual Suricata Conference. SuriCon 2017 will be in November in Prague: https://suricon.net
Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF, its supporting vendors and the community.