Code

Fix an endless loop DoS vulnerability in parse_packet(). collectd-5.1.0-3+deb7u3
authorChris Lamb <lamby@debian.org>
Tue, 4 Apr 2017 14:45:15 +0000 (16:45 +0200)
committerMarc Fournier <marc@bl.uem.li>
Fri, 25 Aug 2017 07:32:14 +0000 (09:32 +0200)
commita05b0dcd448b4b2ce3526e3934aa521c602ba199
tree6bb23b15b655ae663fd9c15a00fe358f0b7c4d40
parent9dddd302ffde95a63349dd9ca0adbee04dc845d6
Fix an endless loop DoS vulnerability in parse_packet().

When a correct "Signature part" is received by a Collectd instance
configured without the AuthFile option, an endless loop occurs due to a
missing pointer increment to the next unprocessed part. (Closes: #859494)
debian/changelog
debian/patches/CVE-2017-7401.dpatch [new file with mode: 0644]