CVE-2023-35852: In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation. https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335 https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17 CVE-2023-35853: In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section. https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da These do seem fixed in 6.0.13.
No stable versions for this package. Adjusted severity accordingly and that means we are all done.