{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-64331","title":"Title"},{"category":"description","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-64331","url":"https://www.suse.com/security/cve/CVE-2025-64331"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254284 for CVE-2025-64331","url":"https://bugzilla.suse.com/1254284"}],"title":"SUSE CVE CVE-2025-64331","tracking":{"current_release_date":"2026-01-24T00:31:50Z","generator":{"date":"2025-11-28T00:22:53Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-64331","initial_release_date":"2025-11-28T00:22:53Z","revision_history":[{"date":"2025-11-28T00:22:53Z","number":"2","summary":"Current version"},{"date":"2026-01-24T00:31:50Z","number":"3","summary":"vulnerabilities added"}],"status":"interim","version":"3"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"libsuricata8_0_3-8.0.3-1.1","product":{"name":"libsuricata8_0_3-8.0.3-1.1","product_id":"libsuricata8_0_3-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/libsuricata8_0_3@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-8.0.3-1.1","product":{"name":"suricata-8.0.3-1.1","product_id":"suricata-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-devel-8.0.3-1.1","product":{"name":"suricata-devel-8.0.3-1.1","product_id":"suricata-devel-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata-devel@8.0.3-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsuricata8_0_3-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1"},"product_reference":"libsuricata8_0_3-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-8.0.3-1.1"},"product_reference":"suricata-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-devel-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"},"product_reference":"suricata-devel-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-64331","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-64331"}],"notes":[{"category":"general","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]},"references":[{"category":"external","summary":"CVE-2025-64331","url":"https://www.suse.com/security/cve/CVE-2025-64331"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254284 for CVE-2025-64331","url":"https://bugzilla.suse.com/1254284"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]}],"threats":[{"category":"impact","date":"2025-11-27T01:00:06Z","details":"important"}],"title":"CVE-2025-64331"}]}