From c55eef18ba3bf77af2384abfe7826abd8f368935 Mon Sep 17 00:00:00 2001 From: olivier Date: Wed, 19 Jul 2017 10:13:45 +0000 Subject: Document vulnerability in collectd5 PR: 220797 Reported by: luca.pizzamiglio@gmail.com Security: CVE-2017-7401 --- security/vuxml/vuln.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ac634b94d8c0..a9e835e39fe6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,33 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures + + + collectd5 + 5.7.1 + + + + +

marcinguy reports:

+
+

After sending this payload, collectd seems to be entering endless while() + loop in packet_parse consuming high CPU resources, possibly crash/gets killed after a while.

+
+ +
+ + https://github.com/collectd/collectd/issues/2174 + CVE-2017-7401 + + + 2017-02-13 + 2017-07-19 + +
+ strongswan -- Insufficient Input Validation in gmp Plugin -- cgit