Untriaged
Permalink
CVE-2026-22259
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Suricata dnp3: unbounded transaction growth
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).
References
-
https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9 x_refsource_CONFIRM
-
https://redmine.openinfosecfoundation.org/issues/8181 x_refsource_MISC
Affected products
suricata
- ==>= 8.0.0, < 8.0.3
- ==< 7.0.14
Package maintainers
-
@magenbluten magenbluten <magenbluten@codemonkey.cc>