suricata -- Multiple vulnerabilities
Details
VuXML ID |
1d53db32-0d60-11f0-8542-b42e991fc52e |
Discovery |
2025-03-12 |
Entry |
2025-03-30 |
Suricate team reports:
Multiple vulnerabilities
-
CVE-2025-29915: Severity HIGH. The AF_PACKET defrag option
is enabled by default and allows AF_PACKET to re-assemble
fragmented packets before reaching Suricata. However the
default packet size in Suricata is based on the network
interface MTU which leads to Suricata seeing truncated
packets.
-
CVE-2025-29916: Severity Moderate. Datasets declared in
rules have an option to specify the `hashsize` to use.
This size setting isn't properly limited, so the hash
table allocation can be large. Untrusted rules can lead to
large memory allocations, potentially leading to denial of
service due to resource starvation
-
CVE-2025-29917: Severity HIGH. The bytes setting in the
decode_base64 keyword is not properly limited. Due to
this, signatures using the keyword and setting can cause
large memory allocations of up to 4 GiB per thread.
-
CVE-2025-29918: Severity HIGH. A PCRE rule can be written
that leads to an infinite loop when negated PCRE is used.
Packet processing thread becomes stuck in infinite loop
limiting visibility and availability in inline mode.
References
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright
information.