Vulnerability Description
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 8.0.0 and below incorrectly handle the entropy keyword when not anchored to a "sticky" buffer, which can lead to a segmentation fault. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules using the entropy keyword, or validate they are anchored to a sticky buffer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oisf | Suricata | 8.0.0 |
Related Weaknesses (CWE)
References
- https://forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018Release Notes
- https://github.com/OISF/suricata/commit/9f32550e18f97ea5d610dd7c36aab0ba142c096cPatch
- https://github.com/OISF/suricata/security/advisories/GHSA-5qf6-92xg-3rr3Issue TrackingThird Party Advisory
- https://redmine.openinfosecfoundation.org/issues/7838Issue Tracking
FAQ
What is CVE-2025-59148?
CVE-2025-59148 is a vulnerability with a CVSS score of 7.5 (HIGH). Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 8.0.0 and below incorrectly handle the entropy keyword w...
How severe is CVE-2025-59148?
CVE-2025-59148 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59148?
Check the references section above for vendor advisories and patch information. Affected products include: Oisf Suricata.