CVE-2025-53537

NameCVE-2025-53537
DescriptionLibHTP is a security-aware parser for the HTTP protocol and its related bits and pieces. In versions 0.5.50 and below, there is a traffic-induced memory leak that can starve the process of memory, leading to loss of visibility. To workaround this issue, set `suricata.yaml app-layer.protocols.http.libhtp.default-config.lzma-enabled` to false. This issue is fixed in version 0.5.51.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1109838

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libhtp (PTS)bullseye1:0.5.36-1fixed
bullseye (security)1:0.5.36-1+deb11u1fixed
bookworm1:0.5.42-1fixed
trixie1:0.5.50-1vulnerable
forky, sid1:0.5.51-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libhtpsourcebullseye(not affected)
libhtpsourcebookworm(not affected)
libhtpsource(unstable)1:0.5.51-11109838

Notes

[trixie] - libhtp <no-dsa> (Minor issue)
[bookworm] - libhtp <not-affected> (Vulnerable code introduced later)
[bullseye] - libhtp <not-affected> (Vulnerable code introduced later)
https://redmine.openinfosecfoundation.org/issues/7766
https://github.com/OISF/libhtp/security/advisories/GHSA-v3qq-h8mh-vph7
Introduced by: https://github.com/OISF/libhtp/commit/226580d502ae98c148aaecc4846f78694b5e253c (0.5.50)
Fixed by: https://github.com/OISF/libhtp/commit/9037ea35110a0d97be5cedf8d31fb4cd9a38c7a7 (0.5.51)

Search for package or bug name: Reporting problems