suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Stack-based Buffer Overflow

<1:8.0.2-1
  • L
Allocation of Resources Without Limits or Throttling

<1:8.0.2-1
  • L
Stack-based Buffer Overflow

<1:8.0.2-1
  • L
Stack-based Buffer Overflow

<1:8.0.2-1
  • L
Heap-based Buffer Overflow

<1:8.0.2-1
  • L
NULL Pointer Dereference

<1:8.0.2-1
  • L
Stack-based Buffer Overflow

<1:8.0.2-1
  • L
Improperly Implemented Security Check for Standard

<1:8.0.1-1
  • M
Allocation of Resources Without Limits or Throttling

<1:7.0.9-1
  • H
Asymmetric Resource Consumption (Amplification)

<1:7.0.8-1
  • L
Resource Exhaustion

<1:7.0.11-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • H
Incomplete Model of Endpoint Features

<1:7.0.8-1
  • M
Off-by-one Error

<1:7.0.7-1
  • C
Integer Underflow

<1:4.1.4-1
  • H
Improper Verification of Cryptographic Signature

<1:7.0.9-1
  • M
Allocation of Resources Without Limits or Throttling

<1:7.0.9-1
  • H
Heap-based Buffer Overflow

<1:7.0.8-1
  • H
NULL Pointer Dereference

<1:7.0.6-1
  • C
Arbitrary Code Injection

<1:5.0.2-1
  • H
CVE-2021-45098

<1:6.0.4-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Improperly Implemented Security Check for Standard

<3.2.1-1
  • H
Out-of-Bounds

<1:4.0.6-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • M
CVE-2024-24568

<1:7.0.3-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:7.0.9-1
  • C
Out-of-bounds Read

<1:4.0.0-1
  • C
CVE-2023-35853

<1:6.0.13-1
  • M
Protection Mechanism Failure

<1:4.0.4-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.5-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • C
Out-of-bounds Write

<1:6.0.4-1
  • M
Resource Management Errors

<2.0.8-1
  • C
Integer Overflow or Wraparound

<1:4.0.5-1
  • M
Improper Input Validation

<3.1.2-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Out-of-bounds Read

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • M
Resource Management Errors

<2.0.4-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.4-1
  • M
Integer Overflow to Buffer Overflow

<1:7.0.8-1
  • H
Buffer Overflow

<1:7.0.5-1
  • H
CVE-2021-35063

<1:6.0.1-3
  • H
Improper Input Validation

<1:4.1.4-1
  • L
Improper Verification of Cryptographic Signature

<1:4.1.3-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:4.1.4-1
  • L
CVE-2017-15377

<1:4.0.0-1
  • H
Directory Traversal

<1:6.0.13-1
  • H
CVE-2018-14568

<1:4.0.5-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:7.0.6-1
  • M
Improper Check for Unusual or Exceptional Conditions

<1:7.0.5-1
  • H
Resource Exhaustion

<1:7.0.8-1
  • H
Use After Free

<1:7.0.3-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • L
Improper Input Validation

<1:4.1.2-2
  • H
CVE-2019-18625

<1:5.0.2-1
  • H
Improper Enforcement of Message or Data Structure

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Out-of-bounds Read

<1:4.0.5-1
  • C
Access Restriction Bypass

<2.0.6-1
  • M
Improper Input Validation

<2.0-1
  • H
NULL Pointer Dereference

<2.0.7-1