suricata.git
10 months agoCVE-2023-35852-1
Pierre Chifflier [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
CVE-2023-35852-1

commit aee1523b4591430ebed1ded0bb95508e6717a335
Author: Jason Ish <jason.ish@oisf.net>
Date:   Tue May 23 15:17:59 2023 -0600

    datasets: don't allow absolute or paths with directory traversal

    For dataset filenames coming from rules, do not allow filenames that
    are absolute or contain a directory traversal with "..". This prevents
    datasets from escaping the define data-directory which may allow a bad
    rule to overwrite any file that Suricata has permission to write to.

    Add a new configuration option,
    "datasets.rules.allow-absolute-filenames" to allow absolute filenames
    in dataset rules. This will be a way to revert back to the pre 6.0.13
    behavior where save/state rules could use any filename.

    Ticket: #6118

Gbp-Pq: Name CVE-2023-35852-1.patch

10 months agoCVE-2021-45098
Pierre Chifflier [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
CVE-2021-45098

commit 50e2b973eeec7172991bf8f544ab06fb782b97df
Author: Victor Julien <victor@inliniac.net>
Date:   Tue Oct 5 14:48:27 2021 +0200

    stream/tcp: handle RST with MD5 or AO header

    Special handling for RST packets if they have an TCP MD5 or AO header option.
    The options hash can't be validated. The end host might be able to validate
    it, as it can have a key/password that was communicated out of band.

    The sender could use this to move the TCP state to 'CLOSED', leading to
    a desync of the TCP session.

    This patch builds on top of
    843d0b7a10bb ("stream: support RST getting lost/ignored")

    It flags the receiver as having received an RST and moves the TCP state
    into the CLOSED state. It then reverts this if the sender continues to
    send traffic. In this case it sets the following event:

        stream-event:suspected_rst_inject;

    Bug: #4710.

Gbp-Pq: Name CVE-2021-45098.patch

10 months ago[PATCH] stream/tcp: don't reject on bad ack
Eric Leblond [Fri, 28 May 2021 10:19:38 +0000 (12:19 +0200)]
[PATCH] stream/tcp: don't reject on bad ack

Not using a packet for the streaming analysis when a non zero
ACK value and ACK bit was unset was leading to evasion as it was
possible to start a session with a SYN packet with a non zero ACK
value to see the full TCP stream to escape all stream and application
layer detection.

This addresses CVE-2021-35063.

Fixes: fa692df37 ("stream: reject broken ACK packets")
Ticket: #4504.

Gbp-Pq: Name stream-no-reject-bad-ack.patch

10 months agollc
Pierre Chifflier [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
llc

Gbp-Pq: Name llc.patch

10 months ago[PATCH] ebpf: avoid to include if_tunnel.h
Eric Leblond [Thu, 31 Oct 2019 12:29:56 +0000 (13:29 +0100)]
[PATCH] ebpf: avoid to include if_tunnel.h

This is causing a dependency issue as file from another architecture
have to be installed.

Gbp-Pq: Name avoid-to-include-if_tunnel-h.patch

10 months agodo not install the suricata Python module
Sascha Steinbiss [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
do not install the suricata Python module

Bug: https://redmine.openinfosecfoundation.org/issues/3156
Last-Update: 2019-09-18

Suricata's Python tools only import submodules of 'suricata'. Not installing
this module ensures that there is no chance of having an __init__.py in the
root module directory that might clash with other packages, e.g. suricata-
update.

Gbp-Pq: Name remove-conflicting-python-file.patch

10 months ago[PATCH] af-packet: fix build on recent Linux kernels
Eric Leblond [Wed, 17 Jul 2019 10:35:12 +0000 (12:35 +0200)]
[PATCH] af-packet: fix build on recent Linux kernels

Gbp-Pq: Name import-sockio-h.patch

10 months agoAdd --with-ebpf-includes parameter
Hilko Bengen [Tue, 23 Jul 2019 12:43:21 +0000 (14:43 +0200)]
Add --with-ebpf-includes parameter

Gbp-Pq: Name with-ebpf-includes.patch

10 months agoconfigure: Introduce CLANG variable
Hilko Bengen [Tue, 22 Jan 2019 17:10:47 +0000 (18:10 +0100)]
configure: Introduce CLANG variable

Gbp-Pq: Name configure-clang-variable.patch

10 months agodo not clean vendor directory on distclean
Sascha Steinbiss [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
do not clean vendor directory on distclean

Last-Update: 2018-12-26

dh_auto_clean calls make distclean, which in the case of Suricata also
removes the vendor directory. This breaks repeated builds.

Gbp-Pq: Name fix-repeated-builds.patch

10 months agoDon't use __USE_GNU
Adrian Bunk [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
Don't use __USE_GNU

__USE_GNU is a glibc-internal symbol.
AC_USE_SYSTEM_EXTENSIONS is the proper autoconf
way to enable extensions.

Gbp-Pq: Name no-use-gnu.patch

10 months agocross
Pierre Chifflier [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
cross

Gbp-Pq: Name cross.patch

10 months agoDebian default configuration This patch sets Debian defaults for suricata configurati...
Arturo Borrero Gonzalez [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
Debian default configuration This patch sets Debian defaults for suricata configuration. . Currently, it sets a proper path for suricata unix socket.

Forwarded: not-needed
Last-Update: 2016-12-01

Gbp-Pq: Name debian-default-cfg.patch

10 months agoPatch to make the suricata build reproducible This patch makes some changes to the...
Arturo Borrero Gonzalez [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
Patch to make the suricata build reproducible This patch makes some changes to the suricata build to make it reproducible . Currently, it only filters out the -fdebug-prefix-map CFLAG which embeds the build path.

Forwarded: not-needed
Last-Update: 2016-09-05

Gbp-Pq: Name reproducible.patch

10 months agosuricata (1:6.0.1-3+deb11u1) bullseye-security; urgency=medium
Thorsten Alteholz [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
suricata (1:6.0.1-3+deb11u1) bullseye-security; urgency=medium

  * Non-maintainer upload by the LTS Team.
  * CVE-2021-45098
    Fix bypass of HTTP-based signature by faking an RST TCP packet.
  * CVE-2023-35852
    Fix unintended file access in local filesystem.
  * CVE-2024-32663
    Fix using large amount of memory.
  * CVE-2024-37151
    Fix mishandling of multiple fragmented packets, which might lead to
    policy bypass.
  * CVE-2024-45796
    Fix logic error during fragment reassembly.
  * CVE-2025-29918
    Fix infinite loop.
  * CVE-2024-55626
    Fix buffer overflow due to large BPF filter file.

[dgit import unpatched suricata 1:6.0.1-3+deb11u1]

10 months agoImport suricata_6.0.1-3+deb11u1.debian.tar.xz
Thorsten Alteholz [Sun, 30 Mar 2025 10:03:02 +0000 (12:03 +0200)]
Import suricata_6.0.1-3+deb11u1.debian.tar.xz

[dgit import tarball suricata 1:6.0.1-3+deb11u1 suricata_6.0.1-3+deb11u1.debian.tar.xz]

5 years agoImport suricata_6.0.1.orig.tar.xz
Sascha Steinbiss [Thu, 8 Oct 2020 20:23:17 +0000 (22:23 +0200)]
Import suricata_6.0.1.orig.tar.xz

[dgit import orig suricata_6.0.1.orig.tar.xz]