On Tue, Apr 04, 2017 at 12:38:19PM +0200, Salvatore Bonaccorso wrote:
> Source: collectd
> Version: 5.4.1-6
> Severity: important
> Tags: security patch upstream
> 
> Hi,
> 
> the following vulnerability was published for collectd.
> 
> CVE-2017-7401[0]:
> | Incorrect interaction of the parse_packet() and
> | parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and
> | earlier allows remote attackers to cause a denial of service (infinite
> | loop) of a collectd instance (configured with "SecurityLevel None" and
> | with empty "AuthFile" options) via a crafted UDP packet.

What's the status? It would be great if this could be fixed before the stretch
release.

Cheers,
        Moritz

Reply via email to