Oisf
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Oisf product.
RSS Feeds for Oisf security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Oisf products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Oisf Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 7 vulnerabilities in Oisf with an average score of 6.4 out of ten. Last year, in 2025 Oisf had 22 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Oisf in 2026 could surpass last years number. Last year, the average CVE base score was greater by 0.56
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 7 | 6.40 |
| 2025 | 22 | 6.96 |
| 2024 | 20 | 7.06 |
| 2023 | 3 | 8.27 |
| 2022 | 0 | 0.00 |
| 2021 | 3 | 8.27 |
| 2020 | 1 | 0.00 |
| 2019 | 7 | 7.50 |
| 2018 | 1 | 7.80 |
It may take a day or so for new Oisf vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Oisf Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-22264 | Jan 27, 2026 |
Suricata 8.0.2 / 7.0.13: Unsigned Int Overflow Heap UAF in Alert GenSuricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet. |
|
| CVE-2026-22263 | Jan 27, 2026 |
Suricata 8.0.x HTTP1 Header Parsing Slowdown (DOS)Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, inefficiency in http1 headers parsing can lead to slowdown over multiple packets. Version 8.0.3 patches the issue. No known workarounds are available. |
|
| CVE-2026-22262 | Jan 27, 2026 |
Suricata stack buffer overflow on dataset save (8.0.3,7.0.14)Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options. |
|
| CVE-2026-22261 | Jan 27, 2026 |
Suricata XFF Slowdown (before 8.0.3/7.0.14)Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, various inefficiencies in xff handling, especially for alerts not triggered in a tx, can lead to severe slowdowns. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, disable XFF support in the eve configuration. The setting is disabled by default. |
|
| CVE-2026-22260 | Jan 27, 2026 |
Suricata 8.0.0-8.0.2 Stack Overflow Crash via req/resp body limitsSuricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`. |
|
| CVE-2026-22259 | Jan 27, 2026 |
Suricata <7.0.14/8.0.3 DNP3 Parsing Memory Exhaustion (CVE-2026-22259)Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default). |
|
| CVE-2026-22258 | Jan 27, 2026 |
Suricata <8.0.3: DCERPC Buffer Expansion Memory Exhaustion (CVE-2026-22258)Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default stream depth is limited to 1MiB. Versions 8.0.3 and 7.0.14 contain a patch. Some workarounds are available. For DCERPC/UDP, disable the parser. For DCERPC/TCP, the `stream.reassembly.depth` setting will limit the amount of data that can be buffered. For DCERPC/SMB, the `stream.reassembly.depth` can be used as well, but is set to unlimited by default. Imposing a limit here may lead to loss of visibility in SMB. |
|
| CVE-2025-64344 | Nov 26, 2025 |
Suricata Stack Overflow via Lua Buffers (vulnerable <7.0.13/8.0.2)Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size. |
|
| CVE-2025-64330 | Nov 26, 2025 |
Suricata < 7.0.13 / 8.0.2 Heap Overflow in eve.alert LoggingSuricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the alert queue size a should be increased (packet-alert-max in suricata.yaml) if verdict is enabled. |
|
| CVE-2025-64331 | Nov 26, 2025 |
Suricata HTTP Body Overflow (7.0.12, 8.0.1)Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default. |
|