{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2026-22259","title":"Title"},{"category":"description","text":"Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2026-22259","url":"https://www.suse.com/security/cve/CVE-2026-22259"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1257373 for CVE-2026-22259","url":"https://bugzilla.suse.com/1257373"}],"title":"SUSE CVE CVE-2026-22259","tracking":{"current_release_date":"2026-01-30T00:26:02Z","generator":{"date":"2026-01-28T00:25:16Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2026-22259","initial_release_date":"2026-01-28T00:25:16Z","revision_history":[{"date":"2026-01-28T00:25:16Z","number":"2","summary":"vulnerabilities added,references added,severity changed from  to important"},{"date":"2026-01-30T00:26:02Z","number":"3","summary":"references added"}],"status":"interim","version":"3"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"libsuricata8_0_3-8.0.3-1.1","product":{"name":"libsuricata8_0_3-8.0.3-1.1","product_id":"libsuricata8_0_3-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/libsuricata8_0_3@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-8.0.3-1.1","product":{"name":"suricata-8.0.3-1.1","product_id":"suricata-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata@8.0.3-1.1"}}},{"category":"product_version","name":"suricata-devel-8.0.3-1.1","product":{"name":"suricata-devel-8.0.3-1.1","product_id":"suricata-devel-8.0.3-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/suricata-devel@8.0.3-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"libsuricata8_0_3-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1"},"product_reference":"libsuricata8_0_3-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-8.0.3-1.1"},"product_reference":"suricata-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"suricata-devel-8.0.3-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"},"product_reference":"suricata-devel-8.0.3-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2026-22259","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-22259"}],"notes":[{"category":"general","text":"Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]},"references":[{"category":"external","summary":"CVE-2026-22259","url":"https://www.suse.com/security/cve/CVE-2026-22259"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1257373 for CVE-2026-22259","url":"https://bugzilla.suse.com/1257373"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:libsuricata8_0_3-8.0.3-1.1","openSUSE Tumbleweed:suricata-8.0.3-1.1","openSUSE Tumbleweed:suricata-devel-8.0.3-1.1"]}],"threats":[{"category":"impact","date":"2026-01-27T19:03:20Z","details":"important"}],"title":"CVE-2026-22259"}]}