{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T20:09:37.587","vulnerabilities":[{"cve":{"id":"CVE-2026-22264","sourceIdentifier":"security-advisories@github.com","published":"2026-01-27T19:16:14.640","lastModified":"2026-01-29T20:58:58.080","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet."},{"lang":"es","value":"Suricata es un motor IDS, IPS y NSM de red. Antes de las versiones 8.0.3 y 7.0.14, un desbordamiento de entero sin signo puede conducir a una condición de uso después de liberación en el heap al generar una cantidad excesiva de alertas para un solo paquete. Las versiones 8.0.3 y 7.0.14 contienen un parche. Como solución alternativa, no ejecute conjuntos de reglas no confiables o ejecute con menos de 65536 firmas que puedan coincidir en el mismo paquete."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.14","matchCriteriaId":"5302B0F0-AF2D-4140-BC66-9186EF7E455D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.3","matchCriteriaId":"E7DA8362-52A2-4ACC-83F7-CA2E77AE89C6"}]}]}],"references":[{"url":"https://github.com/OISF/suricata/commit/549d7bf60616de8e54686a188196453b5b22f715","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/suricata/commit/5789a3d3760dbf33d93fc56c27bd9529e5bdc8f2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/suricata/commit/ac1eb394181530430fb7262969f423a1bf8f209b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/OISF/suricata/security/advisories/GHSA-mqr8-m3m4-2hw5","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://redmine.openinfosecfoundation.org/issues/8190","source":"security-advisories@github.com","tags":["Permissions Required"]}]}}]}