CVE-2025-59148
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oisf | suricata | 8.0.0 |
| oisf | suricata | 8.0.0 |
| oisf | suricata | 8.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Suricata versions 8.0.0 and below involves incorrect handling of the entropy keyword when it is not anchored to a "sticky" buffer. This improper handling can cause a segmentation fault, which is a type of crash or memory error. The issue is fixed in version 8.0.1, and users can mitigate it by disabling rules that use the entropy keyword or ensuring those rules are anchored to a sticky buffer.
How can this vulnerability impact me? :
The vulnerability can cause Suricata to crash due to a segmentation fault when processing certain rules involving the entropy keyword. This can lead to denial of service (DoS) conditions where the network intrusion detection or prevention system becomes unavailable, potentially reducing network security monitoring and protection.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Suricata to version 8.0.1 or later. As a workaround, you can disable rules that use the entropy keyword or ensure that these rules are anchored to a sticky buffer.