SUSE-SU-2017:1365-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20171365-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1365-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:1365-1
Related
Published
2017-05-22T08:41:29Z
Modified
2017-05-22T08:41:29Z
Summary
Security update for collectd
Details

This update for collectd fixes one issue.

This security issue was fixed:

  • CVE-2017-7401: Incorrect interaction of the parsepacket() and parsepartsignsha256() functions in network.c allowed remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with 'SecurityLevel None' and with empty 'AuthFile' options) via a crafted UDP packet (bsc#1032307).
References

Affected packages

SUSE:Lifecycle Management Server 1.3 / collectd

Package

Name
collectd
Purl
pkg:rpm/suse/collectd&distro=SUSE%20Lifecycle%20Management%20Server%201.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.4-0.31.1

Ecosystem specific

{
    "binaries": [
        {
            "collectd": "4.9.4-0.31.1",
            "libcollectdclient-devel": "4.9.4-0.31.1",
            "libcollectdclient0": "4.9.4-0.31.1"
        }
    ]
}

SUSE:WebYast 1.3 / collectd

Package

Name
collectd
Purl
pkg:rpm/suse/collectd&distro=SUSE%20WebYast%201.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.4-0.31.1

Ecosystem specific

{
    "binaries": [
        {
            "collectd": "4.9.4-0.31.1",
            "libcollectdclient-devel": "4.9.4-0.31.1",
            "libcollectdclient0": "4.9.4-0.31.1"
        }
    ]
}