DEBIAN-CVE-2025-64330

Source
https://security-tracker.debian.org/tracker/CVE-2025-64330
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-64330.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-64330
Upstream
Published
2025-11-26T23:15:48.093Z
Modified
2026-03-09T01:33:18.987598Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled.

References

Affected packages

Debian:12 / suricata

Package

Name
suricata
Purl
pkg:deb/debian/suricata?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:6.*
1:6.0.10-1
1:6.0.13-1
1:7.*
1:7.0.0-1
1:7.0.0-2~bpo12+1
1:7.0.0-2
1:7.0.1-1
1:7.0.2-1~bpo12+1
1:7.0.2-1
1:7.0.2-2~exp1
1:7.0.2-2~exp2
1:7.0.2-2
1:7.0.3-1~bpo12+1
1:7.0.3-1
1:7.0.4-1
1:7.0.5-1
1:7.0.5-2~bpo12+1
1:7.0.6-1~bpo12+1
1:7.0.6-1
1:7.0.6-2~exp1
1:7.0.7-1~bpo12+1
1:7.0.7-1
1:7.0.8-1~bpo12+1
1:7.0.8-1
1:7.0.8-2
1:7.0.9-1
1:7.0.10-1~bpo12+1
1:7.0.10-1
1:7.0.11-1~bpo13+1
1:7.0.11-1
1:8.*
1:8.0.0-1~exp1
1:8.0.0-1~exp2
1:8.0.0-1~exp4
1:8.0.0-1~exp5
1:8.0.1-1
1:8.0.1-2
1:8.0.1-3~bpo13+1
1:8.0.1-3
1:8.0.2-1~bpo13+1
1:8.0.2-1
1:8.0.3-1~bpo13+1
1:8.0.3-1
1:8.0.3-2~exp1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-64330.json"

Debian:13 / suricata

Package

Name
suricata
Purl
pkg:deb/debian/suricata?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.0.10-1+deb13u2

Affected versions

1:7.*
1:7.0.10-1
1:7.0.10-1+deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-64330.json"

Debian:14 / suricata

Package

Name
suricata
Purl
pkg:deb/debian/suricata?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.0.2-1

Affected versions

1:7.*
1:7.0.10-1
1:7.0.11-1~bpo13+1
1:7.0.11-1
1:8.*
1:8.0.0-1~exp1
1:8.0.0-1~exp2
1:8.0.0-1~exp4
1:8.0.0-1~exp5
1:8.0.1-1
1:8.0.1-2
1:8.0.1-3~bpo13+1
1:8.0.1-3
1:8.0.2-1~bpo13+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-64330.json"