Fedora has issued an advisory today (May 4): https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3XYZ3VQGC7HBNBJO4ZHVF2PZQ56M5YLB/ Upstream release announcement: https://forum.suricata.io/t/suricata-6-0-5-and-5-0-9-released/2415 Mageia 8 is also affected.
Whiteboard: (none) => MGA8TOO
Updated packages uploaded for Mageia 8 and Cauldron by Guillaume. libhtp2-6.0.5-1.mga8 libhtp-devel-6.0.5-1.mga8 suricata-6.0.5-1.mga8 from suricata-6.0.5-1.mga8.src.rpm
CC: (none) => guillomovitchVersion: Cauldron => 8Assignee: guillomovitch => qa-bugsWhiteboard: MGA8TOO => (none)
MGA8-64 Plasma on Lenovo B50 in Dutch No installation issues. Ref bug 29012 for testing. $ suricata -v Suricata 6.0.5 USAGE: suricata [OPTIONS] [BPF FILTER] -c <path> : path to configuration file -T : test configuration file (use with -c) -i <dev or ip> : run in pcap live mode -F <bpf filter file> : bpf filter file etc..... but $ suricata-update error: pyyaml is required In the previous update refered above, Hugues mentioned something about yaml, is this a missing required???
CC: (none) => herman.viaene
Almost a month with no response to Herman's question, well past time for a feedback flag.
Keywords: (none) => feedbackCC: (none) => andrewsfarm
Fedora has issued an advisory on July 21: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZPSQR5XJCUGMJJK5ORCE7RQZ2JFL56O5/ Upstream release announcement: https://forum.suricata.io/t/suricata-6-0-6-and-5-0-10-released/2637/1 Also see Comment 2, as there appears to be a missing Requires in this package.
Assignee: qa-bugs => guillomovitchSummary: suricata new security issue(s) fixed upstream in 6.0.5 => suricata new security issue(s) fixed upstream in 6.0.6Keywords: feedback => (none)
Fedora has issued an advisory today (December 23): https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ENSDQPLGHMNXN4HPBTK6JV6UOWVYYKGG/ Upstream website is currently inaccessible due to SSL error.
Summary: suricata new security issue(s) fixed upstream in 6.0.6 => suricata new security issue(s) fixed upstream in 6.0.9
Fedora has issued an advisory on April 22: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VBIVPKNZDUFECU5TN5OPVG6CYNW6PLLC/
Summary: suricata new security issue(s) fixed upstream in 6.0.9 => suricata new security issue(s) fixed upstream in 6.0.11
Updated package uploaded by Guillaume yesterday. libhtp2-6.0.11-1.mga8 libhtp-devel-6.0.11-1.mga8 suricata-6.0.11-1.mga8 from suricata-6.0.11-1.mga8.src.rpm
Assignee: guillomovitch => qa-bugs
MGA8-64 MATE on Acer Aspire 5253 No installation issues. Ref bug 29012 for testing. $ suricata -v That gives an error for not being able to write on /var/log/suricata So instead # suricata -v -i wlp7s0 17/5/2023 -- 11:44:24 - <Notice> - This is Suricata version 6.0.11 RELEASE running in SYSTEM mode 17/5/2023 -- 11:44:24 - <Info> - CPUs/cores online: 2 17/5/2023 -- 11:44:25 - <Info> - Found an MTU of 1500 for 'wlp7s0' 17/5/2023 -- 11:44:25 - <Info> - Found an MTU of 1500 for 'wlp7s0' 17/5/2023 -- 11:44:25 - <Info> - fast output device (regular) initialized: fast.log 17/5/2023 -- 11:44:25 - <Info> - eve-log output device (regular) initialized: eve.json 17/5/2023 -- 11:44:25 - <Info> - stats output device (regular) initialized: stats.log 17/5/2023 -- 11:44:25 - <Info> - Running in live mode, activating unix socket 17/5/2023 -- 11:44:25 - <Warning> - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /var/lib/suricata/rules/suricata.rules 17/5/2023 -- 11:44:25 - <Warning> - [ERRCODE: SC_ERR_NO_RULES_LOADED(43)] - 1 rule files specified, but no rules were loaded! 17/5/2023 -- 11:44:25 - <Info> - Threshold config parsed: 0 rule(s) found 17/5/2023 -- 11:44:25 - <Info> - 0 signatures processed. 0 are IP-only rules, 0 are inspecting packet payload, 0 inspect application layer, 0 are decoder event only 17/5/2023 -- 11:44:25 - <Info> - Going to use 2 thread(s) 17/5/2023 -- 11:44:25 - <Info> - Running in live mode, activating unix socket 17/5/2023 -- 11:44:25 - <Info> - Using unix socket file '/var/run/suricata/suricata-command.socket' 17/5/2023 -- 11:44:25 - <Notice> - all 2 packet processing threads, 4 management threads initialized, engine started. 17/5/2023 -- 11:44:25 - <Info> - All AFP capture threads are running. ^C17/5/2023 -- 11:44:56 - <Notice> - Signal Received. Stopping engine. 17/5/2023 -- 11:44:56 - <Info> - time elapsed 31.230s 17/5/2023 -- 11:44:57 - <Info> - Alerts: 0 17/5/2023 -- 11:44:58 - <Info> - cleaning up signature grouping structure... complete 17/5/2023 -- 11:44:58 - <Notice> - Stats for 'wlp7s0': pkts: 39, drop: 0 (0.00%), invalid chksum: No rules loaded, so did (as normal user runs again on write access error) # suricata-update 17/5/2023 -- 11:46:42 - <Info> -- Using data-directory /var/lib/suricata. 17/5/2023 -- 11:46:42 - <Info> -- Using Suricata configuration /etc/suricata/suricata.yaml 17/5/2023 -- 11:46:42 - <Info> -- Using /usr/share/suricata/rules for Suricata provided rules. 17/5/2023 -- 11:46:42 - <Info> -- Found Suricata version 6.0.11 at /usr/sbin/suricata. 17/5/2023 -- 11:46:42 - <Info> -- Loading /etc/suricata/suricata.yaml 17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol http2 17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol modbus 17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol dnp3 17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol enip 17/5/2023 -- 11:46:42 - <Info> -- No sources configured, will use Emerging Threats Open 17/5/2023 -- 11:46:42 - <Info> -- Fetching https://rules.emergingthreats.net/open/suricata-6.0.11/emerging.rules.tar.gz. 100% - 3892052/3892052 17/5/2023 -- 11:46:44 - <Info> -- Done. 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/app-layer-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/decoder-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dhcp-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dnp3-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dns-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/files.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/http-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/ipsec-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/kerberos-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/modbus-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/nfs-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/ntp-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/smb-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/smtp-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/stream-events.rules 17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/tls-events.rules 17/5/2023 -- 11:46:46 - <Info> -- Ignoring file rules/emerging-deleted.rules 17/5/2023 -- 11:47:08 - <Info> -- Loaded 42471 rules. 17/5/2023 -- 11:47:12 - <Info> -- Disabled 14 rules. 17/5/2023 -- 11:47:12 - <Info> -- Enabled 0 rules. 17/5/2023 -- 11:47:12 - <Info> -- Modified 0 rules. 17/5/2023 -- 11:47:12 - <Info> -- Dropped 0 rules. 17/5/2023 -- 11:47:14 - <Info> -- Enabled 131 rules for flowbit dependencies. 17/5/2023 -- 11:47:14 - <Info> -- Creating directory /var/lib/suricata/rules. 17/5/2023 -- 11:47:14 - <Info> -- Backing up current rules. 17/5/2023 -- 11:47:14 - <Info> -- Writing rules to /var/lib/suricata/rules/suricata.rules: total: 42471; enabled: 33767; added: 42471; removed 0; modified: 0 17/5/2023 -- 11:47:16 - <Info> -- Writing /var/lib/suricata/rules/classification.config 17/5/2023 -- 11:47:17 - <Info> -- Testing with suricata -T. 17/5/2023 -- 11:49:53 - <Info> -- Done. Looks good, so try again # suricata -v -i wlp7s0 17/5/2023 -- 13:25:11 - <Notice> - This is Suricata version 6.0.11 RELEASE running in SYSTEM mode 17/5/2023 -- 13:25:11 - <Info> - CPUs/cores online: 2 17/5/2023 -- 13:25:12 - <Info> - Found an MTU of 1500 for 'wlp7s0' 17/5/2023 -- 13:25:12 - <Info> - Found an MTU of 1500 for 'wlp7s0' 17/5/2023 -- 13:25:12 - <Info> - fast output device (regular) initialized: fast.log 17/5/2023 -- 13:25:12 - <Info> - eve-log output device (regular) initialized: eve.json 17/5/2023 -- 13:25:12 - <Info> - stats output device (regular) initialized: stats.log 17/5/2023 -- 13:25:12 - <Info> - Running in live mode, activating unix socket 17/5/2023 -- 13:26:24 - <Info> - 1 rule files processed. 33767 rules successfully loaded, 0 rules failed 17/5/2023 -- 13:26:25 - <Info> - Threshold config parsed: 0 rule(s) found 17/5/2023 -- 13:26:28 - <Info> - 33770 signatures processed. 1295 are IP-only rules, 5196 are inspe no errors anymore ending with Ctrl-C 17/5/2023 -- 13:27:49 - <Notice> - Signal Received. Stopping engine. 17/5/2023 -- 13:27:49 - <Info> - All AFP capture threads are running. 17/5/2023 -- 13:27:49 - <Info> - time elapsed 0.927s 17/5/2023 -- 13:27:50 - <Info> - Alerts: 0 17/5/2023 -- 13:27:51 - <Info> - cleaning up signature grouping structure... complete 17/5/2023 -- 13:27:51 - <Notice> - Stats for 'wlp7s0': pkts: 1, drop: 0 (0.00%), invalid chksum: 0 Seems OK to me, correct me if I'm wrong.
Whiteboard: (none) => MGA8-64-OK
Validating.
CC: (none) => sysadmin-bugsKeywords: (none) => validated_update
CC: (none) => davidwhodginsKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0174.html
Status: NEW => RESOLVEDResolution: (none) => FIXED