Name | CVE-2017-7177 |
Description | Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1603-1, DLA-865-1 |
Debian Bugs | 856649 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
suricata (PTS) | bullseye | 1:6.0.1-3 | fixed |
| bookworm | 1:6.0.10-1 | fixed |
| sid, trixie | 1:7.0.8-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://redmine.openinfosecfoundation.org/issues/2019
Fixed by: https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 (3.2.1)