CVE-2025-64330 – Suricata is vulnerable to a heap buffer overflow on verdict

The following table lists the changes that have been made to the
CVE-2025-64330 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Nov. 26, 2025

    Action Type Old Value New Value
    Added Description Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Added CWE CWE-122
    Added Reference https://github.com/OISF/suricata/commit/482e5eac9218d007adbe2410d6c00173368ce947
    Added Reference https://github.com/OISF/suricata/security/advisories/GHSA-83v7-gm34-f437
Share the Post:

Related Posts