Skip to content

Security: OISF/suricata

Security

SECURITY.md

Security Policy

Being a security tool itself, the security of Suricata itself is naturally of great importance. This document describes the policy around security issues as well as how to report them.

If you believe you found a vulnerability, please report it to us as described in this document.

Support Status of affected code

4 levels are defined: Tier 1, Tier 2, Community and Unmaintained.

These are documented in https://docs.suricata.io/en/latest/support-status.html

Severity Levels

We will determine the severity of each issue, taking into account our experience dealing with past issues, versions affected, common defaults, our estimate of exploitation complexity, part of the code affected, and use cases. We use the following severity categories:

  • CRITICAL Severity. This affects Tier 1 features that are enabled by default. Only remotely triggerable traffic based code execution are considered to be in-scope for this severity. These issues will be kept private and will trigger a new release of all supported versions. We will attempt to address these as soon as possible.

  • HIGH Severity. This affects Tier 1 features that are enabled by default where the issue disrupts availability of the service, leading to severe loss of visibility and/or availability. Remotely triggerable traffic crashes, or evasions with a wide scope are considered to be in-scope for this severity. We will attempt to keep the time these issues are private to a minimum.

  • MODERATE Severity. This includes issues like crashes or evasions in Tier 2 and Community features that are not enabled by default. These will in general be kept private until the next release, and that release will be scheduled so that it can roll up several such flaws at one time.

  • LOW Severity. This includes issues such as those that only affect the Suricata command line utilities, or unlikely configurations. These will in general be fixed as soon as possible in latest development versions, and may be backported to older versions that are still getting updates. These will be part of the Changelog as a security ticket, but they may not trigger new releases.

[!NOTE] We'll be refining the levels based on our experiences with applying them to actual issues.

[!NOTE] We will review the security level considering both IDS and IPS scenarios.

CVE ID's and Github Security Advisories (GHSA)

We will request a CVE ID for an issue if appropriate. Note that multiple issues may share the same CVE ID.

We work with the GitHub CNA, through the GitHub Security Advisory (GHSA) facility.

The GHSA's will be published at least 2 weeks after the public release addressing the issue, together with the Redmine security tickets.

Scope

We are interested in security issues in the Suricata tool itself. If you find a security issue in the Suricata API, we can review it in a case to case basis. Suricata public API documentation is currently a work in progress.

Reporting Issues

For reporting security issues, please use security@oisf.net.

If you report a security issue to us, please share as much detail about the issue as possible: pcaps, attack scripts, potential fixes, etc. If you share confidential or sensitive data like pcaps, please clearly indicate that, in the event that it enters our public domain. Always share a reproducer (with a pcap if relevant). Usually, the best reproducer is a suricata-verify test.

We will assign a severity and will share our assessment with you.

We will create a security ticket, which will be private until at least 2 weeks after a public release addressing the issue.

We will acknowledge you in the release notes, release announcement and GHSA. If you do not want this, please clearly state this. For the GHSA credits, please give us your GitHub handle.

Do not request a CVE ID. We will do it after confirming the issue.

OISF does not participate in bug bounty programs, or offer any other rewards for reporting issues.

Learn more about advisories related to OISF/suricata in the GitHub Advisory Database