Name | CVE-2023-35852 |
Description | In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
suricata (PTS) | jessie, jessie (lts) | 2.0.7-2+deb8u5 | vulnerable |
stretch | 3.2.1-1+deb9u1 | vulnerable | |
buster, buster (lts) | 1:4.1.2-2+deb10u2 | vulnerable | |
bullseye | 1:6.0.1-3 | vulnerable | |
bookworm | 1:6.0.10-1 | vulnerable | |
sid, trixie | 1:7.0.8-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
suricata | source | jessie | (unfixed) | end-of-life | ||
suricata | source | stretch | (unfixed) | end-of-life | ||
suricata | source | (unstable) | 1:6.0.13-1 |
[bookworm] - suricata <no-dsa> (Minor issue)
[bullseye] - suricata <no-dsa> (Minor issue)
[buster] - suricata <no-dsa> (Minor issue)
https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17