Race Condition Affecting suricata package, versions [,6.0.20) [7.0.0-beta1,7.0.6)
Threat Intelligence
EPSS
0.05% (24th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-SURICATA-7448455
- published 14 Jul 2024
- disclosed 11 Jul 2024
- credit Léopold Ouairy, Pascal Melin, Robinson Maigne
Introduced: 11 Jul 2024
CVE-2024-37151 Open this link in a new tabHow to fix?
Upgrade suricata
to version 6.0.20, 7.0.6 or higher.
Overview
Affected versions of this package are vulnerable to Race Condition in defrag-hash.c
when handling multiple fragmented packets using the same IPID value. An attacker can bypass security policies by forcing a packet to improperly be sent before its tracker's remove
bit is set, due to occupying the same hash row as the tracker of a different packet, sent immediately before the malicious one.