Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* |
Wed, 28 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 28 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oisf
Oisf suricata |
|
| Vendors & Products |
Oisf
Oisf suricata |
Tue, 27 Jan 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet. | |
| Title | Suricata detect/alert: heap-use-after-free on alert queue expansion | |
| Weaknesses | CWE-416 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-28T14:02:38.233Z
Reserved: 2026-01-07T05:19:12.923Z
Link: CVE-2026-22264
Updated: 2026-01-28T14:02:34.288Z
Status : Analyzed
Published: 2026-01-27T19:16:14.640
Modified: 2026-01-29T20:58:58.080
Link: CVE-2026-22264
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:00:10Z