An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples.
{ "binaries": [ { "binary_version": "1.1.3+dfsg-6build1", "binary_name": "fastnetmon" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-56072.json"
{ "binaries": [ { "binary_version": "1.1.4-1build5", "binary_name": "fastnetmon" } ] }
{ "binaries": [ { "binary_version": "1.2.6-1build4", "binary_name": "fastnetmon" } ] }
{ "binaries": [ { "binary_version": "1.2.8+git20250911-1", "binary_name": "fastnetmon" } ] }