UBUNTU-CVE-2026-22264

Source
https://ubuntu.com/security/CVE-2026-22264
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-22264
Upstream
Published
2026-01-27T19:16:00Z
Modified
2026-02-03T08:45:07.811919Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet.

References

Affected packages

Ubuntu:16.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@3.0-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.0.8-1build1
2.0.9-1
2.0.10-1
2.0.10-2
2.0.11-1
3.*
3.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.0-1",
            "binary_name": "suricata"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json"

Ubuntu:18.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@3.2-2ubuntu3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.2-2ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.2-2ubuntu3",
            "binary_name": "libhtp-0.5.23-1"
        },
        {
            "binary_version": "3.2-2ubuntu3",
            "binary_name": "suricata"
        },
        {
            "binary_version": "3.2-2ubuntu3",
            "binary_name": "suricata-hyperscan"
        },
        {
            "binary_version": "3.2-2ubuntu3",
            "binary_name": "suricata-oinkmaster"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json"

Ubuntu:22.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@1:6.0.4-3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:6.*
1:6.0.4-2
1:6.0.4-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:6.0.4-3",
            "binary_name": "suricata"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json"

Ubuntu:24.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@1:7.0.3-1build3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:7.*
1:7.0.0-2
1:7.0.2-1
1:7.0.2-1build1
1:7.0.3-1build1
1:7.0.3-1build3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:7.0.3-1build3",
            "binary_name": "suricata"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json"

Ubuntu:25.10 / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@1:7.0.10-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:7.*
1:7.0.8-2
1:7.0.10-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:7.0.10-1",
            "binary_name": "suricata"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22264.json"