Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 690196 (CVE-2019-1010251, CVE-2019-1010279) - net-analyzer/suricata: multiple vulnerabilities
Summary: net-analyzer/suricata: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2019-1010251, CVE-2019-1010279
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Deadline: 2019-12-31
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [noglsa]
Keywords: PMASKED
Depends on:
Blocks:
 
Reported: 2019-07-19 03:16 UTC by D'juan McDonald (domhnall)
Modified: 2020-03-28 21:28 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-07-19 03:16:23 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2019-1010279):

Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.

upstream patch: https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b

upstream bug: https://redmine.openinfosecfoundation.org/issues/2770

(https://nvd.nist.gov/vuln/detail/CVE-2019-1010251):

Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.

upstream patch[1]: https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b

upstream patch[2]:https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe

upstream bug: https://redmine.openinfosecfoundation.org/issues/2736



Gentoo Security Padawan
(domhnall)
Comment 1 Larry the Git Cow gentoo-dev 2019-12-16 18:14:38 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f3fe5e0ccbcf0af56e2d7e0c2c6231a2026df2f9

commit f3fe5e0ccbcf0af56e2d7e0c2c6231a2026df2f9
Author:     Marek Szuba <marecki@gentoo.org>
AuthorDate: 2019-12-16 18:10:25 +0000
Commit:     Marek Szuba <marecki@gentoo.org>
CommitDate: 2019-12-16 18:10:25 +0000

    net-analyzer/suricata: remove vulnerable 4.0.4
    
    Bug: https://bugs.gentoo.org/690196
    Bug: https://bugs.gentoo.org/686428
    Package-Manager: Portage-2.3.79, Repoman-2.3.16
    Signed-off-by: Marek Szuba <marecki@gentoo.org>

 net-analyzer/suricata/Manifest                     |   1 -
 .../files/suricata-4.0.4_configure-lua-flags.patch |  16 --
 .../suricata/files/suricata-4.0.4_sockios.patch    |  13 --
 .../{suricata-4.0.4-conf => suricata-5.0.0-conf}   |   0
 .../{suricata-4.0.4-init => suricata-5.0.0-init}   |   0
 net-analyzer/suricata/suricata-4.0.4.ebuild        | 171 ---------------------
 net-analyzer/suricata/suricata-5.0.0.ebuild        |   4 +-
 7 files changed, 2 insertions(+), 203 deletions(-)
Comment 2 Marek Szuba archtester gentoo-dev 2020-03-19 12:17:36 UTC
Reminder to the security team that this can be resolved now.
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-28 21:28:36 UTC
(In reply to Marek Szuba from comment #2)
> Reminder to the security team that this can be resolved now.

Thanks. 

Closing: noglsa (unstable) and tree is now clean.