suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Incomplete Model of Endpoint Features

<1:7.0.8-1
  • L
Heap-based Buffer Overflow

<1:7.0.8-1
  • L
Resource Exhaustion

<1:7.0.8-1
  • L
Asymmetric Resource Consumption (Amplification)

<1:7.0.8-1
  • L
Integer Overflow to Buffer Overflow

<1:7.0.8-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • M
Off-by-one Error

<1:7.0.7-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:7.0.6-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • H
NULL Pointer Dereference

<1:7.0.6-1
  • H
Buffer Overflow

<1:7.0.5-1
  • M
Improper Check for Unusual or Exceptional Conditions

<1:7.0.5-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.5-1
  • L
CVE-2024-28870

<1:7.0.4-1
  • M
CVE-2024-24568

<1:7.0.3-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • H
Use After Free

<1:7.0.3-1
  • C
CVE-2023-35853

<1:6.0.13-1
  • H
Directory Traversal

<1:6.0.13-1
  • H
CVE-2021-45098

<1:6.0.4-1
  • C
Out-of-bounds Write

<1:6.0.4-1
  • H
CVE-2021-35063

<1:6.0.1-3
  • H
CVE-2019-18625

<1:5.0.2-1
  • C
Arbitrary Code Injection

<1:5.0.2-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Input Validation

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Enforcement of Message or Data Structure

<1:4.1.4-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:4.1.4-1
  • L
Improper Verification of Cryptographic Signature

<1:4.1.3-1
  • L
Improper Input Validation

<1:4.1.2-2
  • C
Integer Underflow

<1:4.1.4-1
  • H
Out-of-bounds Read

<1:4.1.4-1
  • C
Out-of-bounds Read

<1:4.0.0-1
  • C
Integer Overflow or Wraparound

<1:4.0.5-1
  • H
Out-of-bounds Read

<1:4.0.5-1
  • H
Out-of-Bounds

<1:4.0.6-1
  • M
Improper Input Validation

<3.1.2-1
  • H
CVE-2018-14568

<1:4.0.5-1
  • M
Protection Mechanism Failure

<1:4.0.4-1
  • L
CVE-2017-15377

<1:4.0.0-1
  • H
NULL Pointer Dereference

<2.0.7-1
  • C
Access Restriction Bypass

<2.0.6-1
  • H
Improperly Implemented Security Check for Standard

<3.2.1-1
  • M
Resource Management Errors

<2.0.8-1
  • M
Resource Management Errors

<2.0.4-1
  • M
Improper Input Validation

<2.0-1