CVE-2026-22260

NameCVE-2026-22260
DescriptionSuricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
suricata (PTS)bullseye1:6.0.1-3fixed
bullseye (security)1:6.0.1-3+deb11u1fixed
bookworm1:6.0.10-1fixed
trixie1:7.0.10-1+deb13u2fixed
forky, sid1:8.0.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
suricatasourcebullseye(not affected)
suricatasourcebookworm(not affected)
suricatasourcetrixie(not affected)
suricatasource(unstable)1:8.0.3-1

Notes

[trixie] - suricata <not-affected> (Vulnerable code not present)
[bookworm] - suricata <not-affected> (Vulnerable code not present)
[bullseye] - suricata <not-affected> (Vulnerable code not present)
https://github.com/OISF/suricata/security/advisories/GHSA-3gm8-84cm-5x22
https://github.com/OISF/suricata/commit/0dddac7278c8b9cf3c1e4c1c71e620a78ec1c185 (suricata-8.0.3)

Search for package or bug name: Reporting problems