Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4103-1 | suricata security update |
EUVD |
EUVD-2023-39845 | In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation. |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T19:28:15.621Z
Reserved: 2023-06-19T00:00:00.000Z
Link: CVE-2023-35852
Updated: 2025-11-03T19:28:15.621Z
Status : Modified
Published: 2023-06-19T04:15:11.217
Modified: 2025-11-03T20:16:01.437
Link: CVE-2023-35852
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD