suricata-7.0.15-1.el8
- suricata-7.0.15-1.el8
upstream bugfix/security release
upstream bugfix/security release
upstream bugfix/security release
upstream bugfix/security release
Upstream bugfix/security release
Upstream bugfix/security release
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)