suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Resource Exhaustion

*
  • L
Asymmetric Resource Consumption (Amplification)

*
  • L
Integer Overflow to Buffer Overflow

*
  • L
Incomplete Model of Endpoint Features

*
  • L
Heap-based Buffer Overflow

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Off-by-one Error

*
  • L
Reachable Assertion

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • L
Reachable Assertion

*
  • L
NULL Pointer Dereference

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Check for Unusual or Exceptional Conditions

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Buffer Overflow

*
  • L
CVE-2024-28870

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2023-35853

*
  • L
Directory Traversal

*
  • H
CVE-2021-45098

<1:6.0.4-1
  • C
Out-of-bounds Write

<1:6.0.4-1
  • H
CVE-2021-35063

<1:6.0.1-3
  • H
CVE-2019-18625

<1:5.0.2-1
  • C
Arbitrary Code Injection

<1:5.0.2-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Input Validation

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Enforcement of Message or Data Structure

<1:4.1.4-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:4.1.4-1
  • L
Improper Verification of Cryptographic Signature

<1:4.1.3-1
  • L
Improper Input Validation

<1:4.1.2-2
  • C
Integer Underflow

<1:4.1.4-1
  • H
Out-of-bounds Read

<1:4.1.4-1
  • C
Out-of-bounds Read

<1:4.0.0-1
  • C
Integer Overflow or Wraparound

<1:4.0.5-1
  • H
Out-of-bounds Read

<1:4.0.5-1
  • H
Out-of-Bounds

<1:4.0.6-1
  • M
Improper Input Validation

<3.1.2-1
  • H
CVE-2018-14568

<1:4.0.5-1
  • M
Protection Mechanism Failure

<1:4.0.4-1
  • L
CVE-2017-15377

<1:4.0.0-1
  • H
NULL Pointer Dereference

<2.0.7-1
  • C
Access Restriction Bypass

<2.0.6-1
  • H
Improperly Implemented Security Check for Standard

<3.2.1-1
  • M
Resource Management Errors

<2.0.8-1
  • M
Resource Management Errors

<2.0.4-1
  • M
Improper Input Validation

<2.0-1