CVE-2026-22259

NameCVE-2026-22259
DescriptionSuricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
suricata (PTS)bullseye1:6.0.1-3vulnerable
bullseye (security)1:6.0.1-3+deb11u1vulnerable
bookworm1:6.0.10-1vulnerable
trixie1:7.0.10-1+deb13u2vulnerable
forky, sid1:8.0.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
suricatasource(unstable)1:8.0.3-1

Notes

https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9
https://github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7e (suricata-8.0.3)
https://github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942 (suricata-7.0.14)

Search for package or bug name: Reporting problems