Bug 30375 - suricata new security issue(s) fixed upstream in 6.0.11
Summary: suricata new security issue(s) fixed upstream in 6.0.11
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-05-04 18:56 CEST by David Walser
Modified: 2023-05-21 10:44 CEST (History)
5 users (show)

See Also:
Source RPM: suricata-6.0.4-1.mga8.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2022-05-04 18:56:17 CEST
Fedora has issued an advisory today (May 4):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/3XYZ3VQGC7HBNBJO4ZHVF2PZQ56M5YLB/

Upstream release announcement:
https://forum.suricata.io/t/suricata-6-0-5-and-5-0-9-released/2415

Mageia 8 is also affected.
David Walser 2022-05-04 18:56:31 CEST

Whiteboard: (none) => MGA8TOO

Comment 1 David Walser 2022-05-14 18:08:50 CEST
Updated packages uploaded for Mageia 8 and Cauldron by Guillaume.

libhtp2-6.0.5-1.mga8
libhtp-devel-6.0.5-1.mga8
suricata-6.0.5-1.mga8

from suricata-6.0.5-1.mga8.src.rpm

CC: (none) => guillomovitch
Version: Cauldron => 8
Assignee: guillomovitch => qa-bugs
Whiteboard: MGA8TOO => (none)

Comment 2 Herman Viaene 2022-05-16 16:03:24 CEST
MGA8-64 Plasma on Lenovo B50 in Dutch
No installation issues.
Ref bug 29012 for testing.
$ suricata -v
Suricata 6.0.5
USAGE: suricata [OPTIONS] [BPF FILTER]

        -c <path>                            : path to configuration file
        -T                                   : test configuration file (use with -c)
        -i <dev or ip>                       : run in pcap live mode
        -F <bpf filter file>                 : bpf filter file
etc.....
but
$ suricata-update 
error: pyyaml is required

In the previous update refered above, Hugues mentioned something about yaml, is this a missing required???

CC: (none) => herman.viaene

Comment 3 Thomas Andrews 2022-06-14 14:05:38 CEST
Almost a month with no response to Herman's question, well past time for a feedback flag.

Keywords: (none) => feedback
CC: (none) => andrewsfarm

Comment 4 David Walser 2022-07-22 17:08:28 CEST
Fedora has issued an advisory on July 21:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZPSQR5XJCUGMJJK5ORCE7RQZ2JFL56O5/

Upstream release announcement:
https://forum.suricata.io/t/suricata-6-0-6-and-5-0-10-released/2637/1

Also see Comment 2, as there appears to be a missing Requires in this package.

Assignee: qa-bugs => guillomovitch
Summary: suricata new security issue(s) fixed upstream in 6.0.5 => suricata new security issue(s) fixed upstream in 6.0.6
Keywords: feedback => (none)

Comment 5 David Walser 2022-12-23 17:53:13 CET
Fedora has issued an advisory today (December 23):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ENSDQPLGHMNXN4HPBTK6JV6UOWVYYKGG/

Upstream website is currently inaccessible due to SSL error.

Summary: suricata new security issue(s) fixed upstream in 6.0.6 => suricata new security issue(s) fixed upstream in 6.0.9

Comment 6 David Walser 2023-05-07 00:50:10 CEST
Fedora has issued an advisory on April 22:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VBIVPKNZDUFECU5TN5OPVG6CYNW6PLLC/

Summary: suricata new security issue(s) fixed upstream in 6.0.9 => suricata new security issue(s) fixed upstream in 6.0.11

Comment 7 David Walser 2023-05-11 01:58:02 CEST
Updated package uploaded by Guillaume yesterday.

libhtp2-6.0.11-1.mga8
libhtp-devel-6.0.11-1.mga8
suricata-6.0.11-1.mga8

from suricata-6.0.11-1.mga8.src.rpm

Assignee: guillomovitch => qa-bugs

Comment 8 Herman Viaene 2023-05-17 13:29:55 CEST
MGA8-64 MATE on Acer Aspire 5253
No installation issues.
Ref bug 29012 for testing.
$ suricata -v
That gives an error for not being able to write on /var/log/suricata
So instead
# suricata -v -i wlp7s0
17/5/2023 -- 11:44:24 - <Notice> - This is Suricata version 6.0.11 RELEASE running in SYSTEM mode
17/5/2023 -- 11:44:24 - <Info> - CPUs/cores online: 2
17/5/2023 -- 11:44:25 - <Info> - Found an MTU of 1500 for 'wlp7s0'
17/5/2023 -- 11:44:25 - <Info> - Found an MTU of 1500 for 'wlp7s0'
17/5/2023 -- 11:44:25 - <Info> - fast output device (regular) initialized: fast.log
17/5/2023 -- 11:44:25 - <Info> - eve-log output device (regular) initialized: eve.json
17/5/2023 -- 11:44:25 - <Info> - stats output device (regular) initialized: stats.log
17/5/2023 -- 11:44:25 - <Info> - Running in live mode, activating unix socket
17/5/2023 -- 11:44:25 - <Warning> - [ERRCODE: SC_ERR_NO_RULES(42)] - No rule files match the pattern /var/lib/suricata/rules/suricata.rules
17/5/2023 -- 11:44:25 - <Warning> - [ERRCODE: SC_ERR_NO_RULES_LOADED(43)] - 1 rule files specified, but no rules were loaded!
17/5/2023 -- 11:44:25 - <Info> - Threshold config parsed: 0 rule(s) found
17/5/2023 -- 11:44:25 - <Info> - 0 signatures processed. 0 are IP-only rules, 0 are inspecting packet payload, 0 inspect application layer, 0 are decoder event only
17/5/2023 -- 11:44:25 - <Info> - Going to use 2 thread(s)
17/5/2023 -- 11:44:25 - <Info> - Running in live mode, activating unix socket
17/5/2023 -- 11:44:25 - <Info> - Using unix socket file '/var/run/suricata/suricata-command.socket'
17/5/2023 -- 11:44:25 - <Notice> - all 2 packet processing threads, 4 management threads initialized, engine started.
17/5/2023 -- 11:44:25 - <Info> - All AFP capture threads are running.
^C17/5/2023 -- 11:44:56 - <Notice> - Signal Received.  Stopping engine.
17/5/2023 -- 11:44:56 - <Info> - time elapsed 31.230s
17/5/2023 -- 11:44:57 - <Info> - Alerts: 0
17/5/2023 -- 11:44:58 - <Info> - cleaning up signature grouping structure... complete
17/5/2023 -- 11:44:58 - <Notice> - Stats for 'wlp7s0':  pkts: 39, drop: 0 (0.00%), invalid chksum: 

No rules loaded, so did (as normal user runs again on write access error)
# suricata-update
17/5/2023 -- 11:46:42 - <Info> -- Using data-directory /var/lib/suricata.
17/5/2023 -- 11:46:42 - <Info> -- Using Suricata configuration /etc/suricata/suricata.yaml
17/5/2023 -- 11:46:42 - <Info> -- Using /usr/share/suricata/rules for Suricata provided rules.
17/5/2023 -- 11:46:42 - <Info> -- Found Suricata version 6.0.11 at /usr/sbin/suricata.
17/5/2023 -- 11:46:42 - <Info> -- Loading /etc/suricata/suricata.yaml
17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol http2
17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol modbus
17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol dnp3
17/5/2023 -- 11:46:42 - <Info> -- Disabling rules for protocol enip
17/5/2023 -- 11:46:42 - <Info> -- No sources configured, will use Emerging Threats Open
17/5/2023 -- 11:46:42 - <Info> -- Fetching https://rules.emergingthreats.net/open/suricata-6.0.11/emerging.rules.tar.gz.
 100% - 3892052/3892052               
17/5/2023 -- 11:46:44 - <Info> -- Done.
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/app-layer-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/decoder-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dhcp-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dnp3-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/dns-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/files.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/http-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/ipsec-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/kerberos-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/modbus-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/nfs-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/ntp-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/smb-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/smtp-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/stream-events.rules
17/5/2023 -- 11:46:44 - <Info> -- Loading distribution rule file /usr/share/suricata/rules/tls-events.rules
17/5/2023 -- 11:46:46 - <Info> -- Ignoring file rules/emerging-deleted.rules
17/5/2023 -- 11:47:08 - <Info> -- Loaded 42471 rules.
17/5/2023 -- 11:47:12 - <Info> -- Disabled 14 rules.
17/5/2023 -- 11:47:12 - <Info> -- Enabled 0 rules.
17/5/2023 -- 11:47:12 - <Info> -- Modified 0 rules.
17/5/2023 -- 11:47:12 - <Info> -- Dropped 0 rules.
17/5/2023 -- 11:47:14 - <Info> -- Enabled 131 rules for flowbit dependencies.
17/5/2023 -- 11:47:14 - <Info> -- Creating directory /var/lib/suricata/rules.
17/5/2023 -- 11:47:14 - <Info> -- Backing up current rules.
17/5/2023 -- 11:47:14 - <Info> -- Writing rules to /var/lib/suricata/rules/suricata.rules: total: 42471; enabled: 33767; added: 42471; removed 0; modified: 0
17/5/2023 -- 11:47:16 - <Info> -- Writing /var/lib/suricata/rules/classification.config
17/5/2023 -- 11:47:17 - <Info> -- Testing with suricata -T.
17/5/2023 -- 11:49:53 - <Info> -- Done.
Looks good, so try again
# suricata -v -i wlp7s0
17/5/2023 -- 13:25:11 - <Notice> - This is Suricata version 6.0.11 RELEASE running in SYSTEM mode
17/5/2023 -- 13:25:11 - <Info> - CPUs/cores online: 2
17/5/2023 -- 13:25:12 - <Info> - Found an MTU of 1500 for 'wlp7s0'
17/5/2023 -- 13:25:12 - <Info> - Found an MTU of 1500 for 'wlp7s0'
17/5/2023 -- 13:25:12 - <Info> - fast output device (regular) initialized: fast.log
17/5/2023 -- 13:25:12 - <Info> - eve-log output device (regular) initialized: eve.json
17/5/2023 -- 13:25:12 - <Info> - stats output device (regular) initialized: stats.log
17/5/2023 -- 13:25:12 - <Info> - Running in live mode, activating unix socket
17/5/2023 -- 13:26:24 - <Info> - 1 rule files processed. 33767 rules successfully loaded, 0 rules failed
17/5/2023 -- 13:26:25 - <Info> - Threshold config parsed: 0 rule(s) found
17/5/2023 -- 13:26:28 - <Info> - 33770 signatures processed. 1295 are IP-only rules, 5196 are inspe
no errors anymore
ending with Ctrl-C
17/5/2023 -- 13:27:49 - <Notice> - Signal Received.  Stopping engine.
17/5/2023 -- 13:27:49 - <Info> - All AFP capture threads are running.
17/5/2023 -- 13:27:49 - <Info> - time elapsed 0.927s
17/5/2023 -- 13:27:50 - <Info> - Alerts: 0
17/5/2023 -- 13:27:51 - <Info> - cleaning up signature grouping structure... complete
17/5/2023 -- 13:27:51 - <Notice> - Stats for 'wlp7s0':  pkts: 1, drop: 0 (0.00%), invalid chksum: 0
Seems OK to me, correct me if I'm wrong.

Whiteboard: (none) => MGA8-64-OK

Comment 9 Thomas Andrews 2023-05-17 13:48:41 CEST
Validating.

CC: (none) => sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2023-05-21 02:41:32 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 10 Mageia Robot 2023-05-21 10:44:12 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2023-0174.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.