CVE-2025-59148

7.5 HIGH
Published: October 01, 2025 Modified: October 06, 2025

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 8.0.0 and below incorrectly handle the entropy keyword when not anchored to a "sticky" buffer, which can lead to a segmentation fault. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules using the entropy keyword, or validate they are anchored to a sticky buffer.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018
Source: security-advisories@github.com
Release Notes
https://github.com/OISF/suricata/security/advisories/GHSA-5qf6-92xg-3rr3
Source: security-advisories@github.com
Issue Tracking Third Party Advisory
https://redmine.openinfosecfoundation.org/issues/7838
Source: security-advisories@github.com
Issue Tracking

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
EPSS (Exploit Probability)
0.1%
21th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

oisf