Incorrect interaction of the parsepacket() and parsepartsignsha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.
{
"binaries": [
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "collectd"
},
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "collectd-core"
},
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "collectd-dev"
},
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "collectd-utils"
},
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "libcollectdclient-dev"
},
{
"binary_version": "5.4.0-3ubuntu2.2+esm1",
"binary_name": "libcollectdclient1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "collectd"
},
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "collectd-core"
},
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "collectd-dev"
},
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "collectd-utils"
},
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "libcollectdclient-dev"
},
{
"binary_version": "5.5.1-1ubuntu0.1~esm1",
"binary_name": "libcollectdclient1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}