{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-59147","title":"Title"},{"category":"description","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-59147","url":"https://www.suse.com/security/cve/CVE-2025-59147"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1250920 for CVE-2025-59147","url":"https://bugzilla.suse.com/1250920"}],"title":"SUSE CVE CVE-2025-59147","tracking":{"current_release_date":"2025-10-02T23:23:03Z","generator":{"date":"2025-10-02T23:23:03Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-59147","initial_release_date":"2025-10-02T23:23:03Z","revision_history":[{"date":"2025-10-02T23:23:03Z","number":"2","summary":"Current version"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"libsuricata8_0_1-8.0.1-1.1","product":{"name":"libsuricata8_0_1-8.0.1-1.1","product_id":"libsuricata8_0_1-8.0.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/libsuricata8_0_1@8.0.1-1.1"}}},{"category":"product_version","name":"suricata-8.0.1-1.1","product":{"name":"suricata-8.0.1-1.1","product_id":"suricata-8.0.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata@8.0.1-1.1"}}},{"category":"product_version","name":"suricata-devel-8.0.1-1.1","product":{"name":"suricata-devel-8.0.1-1.1","product_id":"suricata-devel-8.0.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata-devel@8.0.1-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsuricata8_0_1-8.0.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libsuricata8_0_1-8.0.1-1.1"},"product_reference":"libsuricata8_0_1-8.0.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-8.0.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-8.0.1-1.1"},"product_reference":"suricata-8.0.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-devel-8.0.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-devel-8.0.1-1.1"},"product_reference":"suricata-devel-8.0.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-59147","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-59147"}],"notes":[{"category":"general","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libsuricata8_0_1-8.0.1-1.1","openSUSE Tumbleweed:suricata-8.0.1-1.1","openSUSE Tumbleweed:suricata-devel-8.0.1-1.1"]},"references":[{"category":"external","summary":"CVE-2025-59147","url":"https://www.suse.com/security/cve/CVE-2025-59147"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1250920 for CVE-2025-59147","url":"https://bugzilla.suse.com/1250920"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libsuricata8_0_1-8.0.1-1.1","openSUSE Tumbleweed:suricata-8.0.1-1.1","openSUSE Tumbleweed:suricata-devel-8.0.1-1.1"]}],"threats":[{"category":"impact","date":"2025-10-01T22:10:44Z","details":"important"}],"title":"CVE-2025-59147"}]}