suricata vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the suricata package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Improperly Implemented Security Check for Standard

<1:7.0.10-1+deb13u1
  • L
Resource Exhaustion

<1:7.0.10-1+deb13u1
  • H
Improper Verification of Cryptographic Signature

<1:7.0.9-1
  • M
Allocation of Resources Without Limits or Throttling

<1:7.0.9-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:7.0.9-1
  • M
Allocation of Resources Without Limits or Throttling

<1:7.0.9-1
  • H
Incomplete Model of Endpoint Features

<1:7.0.8-1
  • H
Heap-based Buffer Overflow

<1:7.0.8-1
  • H
Resource Exhaustion

<1:7.0.8-1
  • H
Asymmetric Resource Consumption (Amplification)

<1:7.0.8-1
  • M
Integer Overflow to Buffer Overflow

<1:7.0.8-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Reachable Assertion

<1:7.0.7-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • M
Off-by-one Error

<1:7.0.7-1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<1:7.0.7-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:7.0.6-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.6-1
  • H
NULL Pointer Dereference

<1:7.0.6-1
  • H
Buffer Overflow

<1:7.0.5-1
  • M
Improper Check for Unusual or Exceptional Conditions

<1:7.0.5-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.5-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.4-1
  • M
CVE-2024-24568

<1:7.0.3-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • H
Allocation of Resources Without Limits or Throttling

<1:7.0.3-1
  • H
Use After Free

<1:7.0.3-1
  • C
CVE-2023-35853

<1:6.0.13-1
  • H
Directory Traversal

<1:6.0.13-1
  • H
CVE-2021-45098

<1:6.0.4-1
  • C
Out-of-bounds Write

<1:6.0.4-1
  • H
CVE-2021-35063

<1:6.0.1-3
  • H
CVE-2019-18625

<1:5.0.2-1
  • C
Arbitrary Code Injection

<1:5.0.2-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • L
Out-of-bounds Read

<1:4.1.5-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Input Validation

<1:4.1.4-1
  • H
Out-of-Bounds

<1:4.1.4-1
  • H
Improper Enforcement of Message or Data Structure

<1:4.1.4-1
  • H
Improper Check for Unusual or Exceptional Conditions

<1:4.1.4-1
  • L
Improper Verification of Cryptographic Signature

<1:4.1.3-1
  • L
Improper Input Validation

<1:4.1.2-2
  • C
Integer Underflow

<1:4.1.4-1
  • H
Out-of-bounds Read

<1:4.1.4-1
  • C
Integer Overflow or Wraparound

<1:4.0.5-1
  • C
Out-of-bounds Read

<1:4.0.0-1
  • H
Out-of-bounds Read

<1:4.0.5-1
  • H
Out-of-Bounds

<1:4.0.6-1
  • H
CVE-2018-14568

<1:4.0.5-1
  • M
Improper Input Validation

<3.1.2-1
  • M
Protection Mechanism Failure

<1:4.0.4-1
  • L
CVE-2017-15377

<1:4.0.0-1
  • H
NULL Pointer Dereference

<2.0.7-1
  • C
Access Restriction Bypass

<2.0.6-1
  • H
Improperly Implemented Security Check for Standard

<3.2.1-1
  • M
Resource Management Errors

<2.0.8-1
  • M
Resource Management Errors

<2.0.4-1
  • M
Improper Input Validation

<2.0-1