suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Heap-based Buffer Overflow

*
  • L
Resource Exhaustion

*
  • L
Integer Overflow to Buffer Overflow

*
  • L
Asymmetric Resource Consumption (Amplification)

*
  • L
Incomplete Model of Endpoint Features

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Off-by-one Error

*
  • L
Reachable Assertion

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Reachable Assertion

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
NULL Pointer Dereference

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Buffer Overflow

*
  • L
CVE-2024-28870

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2023-35853

*
  • L
Directory Traversal

*
  • L
CVE-2021-45098

*
  • L
Out-of-bounds Write

*
  • H
CVE-2021-35063

<1:6.0.1-3
  • H
CVE-2019-18625

<1:5.0.2-1
  • C
Arbitrary Code Injection

<1:5.0.2-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Input Validation

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Enforcement of Message or Data Structure

<1:4.1.4-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:4.1.4-1
  • L
Improper Verification of Cryptographic Signature

<1:4.1.3-1
  • L
Improper Input Validation

<1:4.1.2-2
  • C
Integer Underflow

<1:4.1.4-1
  • H
Out-of-bounds Read

<1:4.1.4-1
  • C
Integer Overflow or Wraparound

<1:4.0.5-1
  • C
Out-of-bounds Read

<1:4.0.0-1
  • H
Out-of-bounds Read

<1:4.0.5-1
  • H
Out-of-Bounds

<1:4.0.6-1
  • M
Improper Input Validation

<3.1.2-1
  • H
CVE-2018-14568

<1:4.0.5-1
  • M
Protection Mechanism Failure

<1:4.0.4-1
  • L
CVE-2017-15377

<1:4.0.0-1
  • H
NULL Pointer Dereference

<2.0.7-1
  • C
Access Restriction Bypass

<2.0.6-1
  • H
Improperly Implemented Security Check for Standard

<3.2.1-1
  • M
Resource Management Errors

<2.0.8-1
  • M
Resource Management Errors

<2.0.4-1
  • M
Improper Input Validation

<2.0-1