Login
Newsletter
Werbung

Sicherheit: Denial of Service in Suricata
Aktuelle Meldungen Distributionen
Name: Denial of Service in Suricata
ID: FEDORA-2014-11462
Distribution: Fedora
Plattformen: Fedora 20
Datum: Sa, 4. Oktober 2014, 10:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6603
Applikationen: Suricata

Originalnachricht

Name        : suricata
Product : Fedora 20
Version : 2.0.4
Release : 1.fc20
URL : http://suricata-ids.org/
Summary : Intrusion Detection System
Description :
The Suricata Engine is an Open Source Next Generation Intrusion
Detection and Prevention Engine. This engine is not intended to
just replace or emulate the existing tools in the industry, but
will bring new ideas and technologies to the field. This new Engine
supports Multi-threading, Automatic Protocol Detection (IP, TCP,
UDP, ICMP, HTTP, TLS, FTP and SMB! ), Gzip Decompression, Fast IP
Matching, and GeoIP identification.

-------------------------------------------------------------------------------
-
Update Information:

This update fixes a bug in the SSH parser, where a malformed banner could lead
to evasion of SSH rules and missing log entries. In some cases it may also lead to a crash, CVE-2014-6603.
Additionally, this release also addresses a new IPv6 issue that can lead to
evasion.
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Sep 24 2014 Steve Grubb <sgrubb@redhat.com> 2.0.4-1
- New upstream bug fix release
- Fixes CVE-2014-6603 out-of-bounds access in SSH parser
* Mon Aug 18 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 2.0.3-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Fri Aug 8 2014 Steve Grubb <sgrubb@redhat.com> 2.0.3-1
- New upstream bug fix release
* Sat Jun 28 2014 Steve Grubb <sgrubb@redhat.com> 2.0.2-2
- Specfile cleanups (#1113413)
* Wed Jun 25 2014 Steve Grubb <sgrubb@redhat.com> 2.0.2-1
- New upstream bug fix release
- Enable liblua support
* Sun Jun 8 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 2.0.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Wed May 21 2014 Steve Grubb <sgrubb@redhat.com> 2.0.1-1
- New upstream bug fix release
* Wed Mar 26 2014 Steve Grubb <sgrubb@redhat.com> 2.0-1
- Major new upstream release with new features
* Tue Jan 21 2014 Dan Horák <dan[at]danny.cz> 1.4.7-3
- luajit available only on selected arches
* Sat Jan 11 2014 Steve Grubb <sgrubb@redhat.com> 1.4.7-2
- Enable luajit support
* Wed Dec 18 2013 Steve Grubb <sgrubb@redhat.com> 1.4.7-1
- New upstream bug fix release
* Fri Oct 4 2013 Steve Grubb <sgrubb@redhat.com> 1.4.6-1
- New upstream bug fix release
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1146020 - CVE-2014-6603 suricata: out-of-bounds access in SSH
parser
https://bugzilla.redhat.com/show_bug.cgi?id=1146020
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update suricata' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung