CVE-2024-37151

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-37151
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37151.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-37151
Aliases
  • GHSA-qrp7-g66m-px24
Downstream
Related
Published
2024-07-11T14:39:32Z
Modified
2025-10-20T20:27:02.689546Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Suricata defrag: IP ID reuse can lead to policy bypass
Details

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable defrag to reduce the scope of the problem.

Database specific
{
    "cwe_ids": [
        "CWE-754"
    ]
}
References

Affected packages

Git / github.com/oisf/suricata

Affected ranges

Type
GIT
Repo
https://github.com/oisf/suricata
Events
Type
GIT
Repo
https://github.com/oisf/suricata
Events

Affected versions

suricata-6.*

suricata-6.0.0
suricata-6.0.1
suricata-6.0.10
suricata-6.0.11
suricata-6.0.12
suricata-6.0.13
suricata-6.0.14
suricata-6.0.15
suricata-6.0.16
suricata-6.0.17
suricata-6.0.18
suricata-6.0.19
suricata-6.0.2
suricata-6.0.3
suricata-6.0.4
suricata-6.0.5
suricata-6.0.6
suricata-6.0.7
suricata-6.0.8
suricata-6.0.9

suricata-7.*

suricata-7.0.0
suricata-7.0.1
suricata-7.0.2
suricata-7.0.3
suricata-7.0.4
suricata-7.0.5