Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1980453 | Issue Tracking Third Party Advisory |
https://forum.suricata.io/t/suricata-6-0-3-and-5-0-7-released/1489 | Release Notes Vendor Advisory |
https://github.com/OISF/suricata/releases | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JU27J2ZYG6FBDL5CERE6FBB4ZFGHOROE/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XEP7PWY4LRT2R4MFLV7JIJRYZEZ7RQFL/ | |
https://security-tracker.debian.org/tracker/CVE-2021-35063 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-22 18:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-35063
Mitre link : CVE-2021-35063
CVE.ORG link : CVE-2021-35063
JSON object : View
Products Affected
oisf
- suricata
debian
- debian_linux
fedoraproject
- fedora
CWE