Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions 7.0.10 and below and 8.0.0-beta1 through 8.0.0-rc1, mishandling of data on HTTP2 stream 0 can lead to uncontrolled memory usage, leading to loss of visibility. Workarounds include disabling the HTTP/2 parser, and using a signature like drop http2 any any -> any any (frame:http2.hdr; byte_test:1,=,0,3; byte_test:4,=,0,5; sid: 1;) where the first byte test tests the HTTP2 frame type DATA and the second tests the stream id 0. This is fixed in versions 7.0.11 and 8.0.0.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oisf
Oisf suricata |
|
Vendors & Products |
Oisf
Oisf suricata |
Tue, 22 Jul 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions 7.0.10 and below and 8.0.0-beta1 through 8.0.0-rc1, mishandling of data on HTTP2 stream 0 can lead to uncontrolled memory usage, leading to loss of visibility. Workarounds include disabling the HTTP/2 parser, and using a signature like drop http2 any any -> any any (frame:http2.hdr; byte_test:1,=,0,3; byte_test:4,=,0,5; sid: 1;) where the first byte test tests the HTTP2 frame type DATA and the second tests the stream id 0. This is fixed in versions 7.0.11 and 8.0.0. | |
Title | Suricata's mishandling of data on HTTP2 stream 0 can lead to resource starvation | |
Weaknesses | CWE-400 CWE-770 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-22T21:36:03.976Z
Updated: 2025-07-23T18:32:21.856Z
Reserved: 2025-07-02T15:15:11.515Z
Link: CVE-2025-53538

Updated: 2025-07-23T18:32:18.596Z

Status : Awaiting Analysis
Published: 2025-07-22T22:15:37.620
Modified: 2025-07-25T15:29:44.523
Link: CVE-2025-53538

No data.