diff options
author | olivier <olivier@FreeBSD.org> | 2017-07-19 18:13:45 +0800 |
---|---|---|
committer | olivier <olivier@FreeBSD.org> | 2017-07-19 18:13:45 +0800 |
commit | c55eef18ba3bf77af2384abfe7826abd8f368935 (patch) | |
tree | 16a3674a04ab57ff2d9b1d247bb1ce0fb6a31c9d /security | |
parent | 85d29b195ebd8f6041c1dcba64461c09f02bfde5 (diff) | |
download | freebsd-ports-gnome-c55eef18ba3bf77af2384abfe7826abd8f368935.tar.gz freebsd-ports-gnome-c55eef18ba3bf77af2384abfe7826abd8f368935.tar.zst freebsd-ports-gnome-c55eef18ba3bf77af2384abfe7826abd8f368935.zip |
Document vulnerability in collectd5
PR: 220797
Reported by: luca.pizzamiglio@gmail.com
Security: CVE-2017-7401
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ac634b94d8c0..a9e835e39fe6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,33 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="08a2df48-6c6a-11e7-9b01-2047478f2f70"> + <topic>collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures</topic> + <affects> + <package> + <name>collectd5</name> + <range><eq>5.7.1</eq></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>marcinguy reports:</p> + <blockquote cite="https://github.com/collectd/collectd/issues/2174"> + <p>After sending this payload, collectd seems to be entering endless while() + loop in packet_parse consuming high CPU resources, possibly crash/gets killed after a while.</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/collectd/collectd/issues/2174</url> + <cvename>CVE-2017-7401</cvename> + </references> + <dates> + <discovery>2017-02-13</discovery> + <entry>2017-07-19</entry> + </dates> + </vuln> + <vuln vid="e6ccaf8a-6c63-11e7-9b01-2047478f2f70"> <topic>strongswan -- Insufficient Input Validation in gmp Plugin</topic> <affects> |