Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In version 8.0.0, rules using keyword ldap.responses.attribute_type (which is long) with transforms can lead to a stack buffer overflow during Suricata startup or during a rule reload. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules with ldap.responses.attribute_type and transforms.
References
| Link | Resource |
|---|---|
| https://forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018 | Release Notes |
| https://github.com/OISF/suricata/commit/38a2cba5c397002047d84645f5ab770ff88020e1 | Patch |
| https://github.com/OISF/suricata/security/advisories/GHSA-vxcg-38x4-gj7j | Third Party Advisory Issue Tracking |
| https://redmine.openinfosecfoundation.org/issues/7861 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 20:18
Updated : 2025-10-06 17:01
NVD link : CVE-2025-59149
Mitre link : CVE-2025-59149
CVE.ORG link : CVE-2025-59149
JSON object : View
Products Affected
oisf
- suricata
CWE
CWE-121
Stack-based Buffer Overflow
