{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-64344","title":"Title"},{"category":"description","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-64344","url":"https://www.suse.com/security/cve/CVE-2025-64344"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254278 for CVE-2025-64344","url":"https://bugzilla.suse.com/1254278"}],"title":"SUSE CVE CVE-2025-64344","tracking":{"current_release_date":"2026-01-24T00:31:42Z","generator":{"date":"2025-11-28T00:22:46Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-64344","initial_release_date":"2025-11-28T00:22:46Z","revision_history":[{"date":"2025-11-28T00:22:46Z","number":"2","summary":"Current version"},{"date":"2026-01-24T00:31:42Z","number":"3","summary":"vulnerabilities added"}],"status":"interim","version":"3"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"libsuricata8_0_3-8.0.3-1.1","product":{"name":"libsuricata8_0_3-8.0.3-1.1","product_id":"libsuricata8_0_3-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/libsuricata8_0_3@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-8.0.3-1.1","product":{"name":"suricata-8.0.3-1.1","product_id":"suricata-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-devel-8.0.3-1.1","product":{"name":"suricata-devel-8.0.3-1.1","product_id":"suricata-devel-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata-devel@8.0.3-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsuricata8_0_3-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1"},"product_reference":"libsuricata8_0_3-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-8.0.3-1.1"},"product_reference":"suricata-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-devel-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"},"product_reference":"suricata-devel-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-64344","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-64344"}],"notes":[{"category":"general","text":"Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]},"references":[{"category":"external","summary":"CVE-2025-64344","url":"https://www.suse.com/security/cve/CVE-2025-64344"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1254278 for CVE-2025-64344","url":"https://bugzilla.suse.com/1254278"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]}],"threats":[{"category":"impact","date":"2025-11-27T01:00:08Z","details":"important"}],"title":"CVE-2025-64344"}]}