Bug 2417415 (CVE-2025-64331)

Summary: CVE-2025-64331 Suricata: Suricata: Stack overflow vulnerability in HTTP processing leads to denial of service
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Suricata. This vulnerability allows a stack overflow, leading to a denial of service (DoS), via large HTTP (Hypertext Transfer Protocol) file transfers when the HTTP (Hypertext Transfer Protocol) response body limit is increased and logging of printable HTTP (Hypertext Transfer Protocol) bodies is enabled.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2417515, 2417517, 2417524, 2417529    
Bug Blocks:    

Description OSIDB Bzimport 2025-11-27 00:01:28 UTC
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.