{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-64330","title":"Title"},{"category":"description","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-64330","url":"https://www.suse.com/security/cve/CVE-2025-64330"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254283 for CVE-2025-64330","url":"https://bugzilla.suse.com/1254283"}],"title":"SUSE CVE CVE-2025-64330","tracking":{"current_release_date":"2026-01-24T00:31:51Z","generator":{"date":"2025-11-28T00:22:55Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-64330","initial_release_date":"2025-11-28T00:22:55Z","revision_history":[{"date":"2025-11-28T00:22:55Z","number":"2","summary":"Current version"},{"date":"2026-01-24T00:31:51Z","number":"3","summary":"vulnerabilities added"}],"status":"interim","version":"3"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"libsuricata8_0_3-8.0.3-1.1","product":{"name":"libsuricata8_0_3-8.0.3-1.1","product_id":"libsuricata8_0_3-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/libsuricata8_0_3@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-8.0.3-1.1","product":{"name":"suricata-8.0.3-1.1","product_id":"suricata-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-devel-8.0.3-1.1","product":{"name":"suricata-devel-8.0.3-1.1","product_id":"suricata-devel-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata-devel@8.0.3-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsuricata8_0_3-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1"},"product_reference":"libsuricata8_0_3-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-8.0.3-1.1"},"product_reference":"suricata-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-devel-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"},"product_reference":"suricata-devel-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-64330","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-64330"}],"notes":[{"category":"general","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]},"references":[{"category":"external","summary":"CVE-2025-64330","url":"https://www.suse.com/security/cve/CVE-2025-64330"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254283 for CVE-2025-64330","url":"https://bugzilla.suse.com/1254283"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]}],"threats":[{"category":"impact","date":"2025-11-27T01:00:05Z","details":"important"}],"title":"CVE-2025-64330"}]}