We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-29915

Suricata af-packet: defrag option can lead to truncated packets affecting visibility



Description

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The AF_PACKET defrag option is enabled by default and allows AF_PACKET to re-assemble fragmented packets before reaching Suricata. However the default packet size in Suricata is based on the network interface MTU which leads to Suricata seeing truncated packets. Upgrade to Suricata 7.0.9, which uses better defaults and adds warnings for user configurations that may lead to issues.

Reserved 2025-03-12 | Published 2025-04-10 | Updated 2025-04-10 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

CWE-347: Improper Verification of Cryptographic Signature

Product status

< 7.0.9
affected

References

github.com/...ricata/security/advisories/GHSA-7m5c-cqx4-x8mp

github.com/...ommit/d78f2c9a4e2b59f44daeddff098915084493d08d

redmine.openinfosecfoundation.org/issues/5373

cve.org (CVE-2025-29915)

nvd.nist.gov (CVE-2025-29915)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-29915

Support options

Helpdesk Chat, Email, Knowledgebase