DEBIAN-CVE-2024-55629

Source
https://security-tracker.debian.org/tracker/CVE-2024-55629
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-55629.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-55629
Upstream
Published
2025-01-06T18:15:23Z
Modified
2025-09-19T06:04:58Z
Summary
[none]
Details

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set.

References

Affected packages

Debian:13 / suricata

Package

Name
suricata
Purl
pkg:deb/debian/suricata?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.0.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / suricata

Package

Name
suricata
Purl
pkg:deb/debian/suricata?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.0.8-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}