lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <E1bTOTl-0002jO-Uj@seger.debian.org> Date: Sat, 30 Jul 2016 07:14:37 +0000 From: Sebastien Delafond <seb@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 3636-1] collectd security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3636-1 security@...ian.org https://www.debian.org/security/ Sebastien Delafond July 30, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : collectd CVE ID : CVE-2016-6254 Debian Bug : 832507 832577 Emilien Gaspar discovered that collectd, a statistics collection and monitoring daemon, incorrectly processed incoming network packets. This resulted in a heap overflow, allowing a remote attacker to either cause a DoS via application crash, or potentially execute arbitrary code. Additionally, security researchers at Columbia University and the University of Virginia discovered that collectd failed to verify a return value during initialization. This meant the daemon could sometimes be started without the desired, secure settings. For the stable distribution (jessie), this problem has been fixed in version 5.4.1-6+deb8u1. For the testing (stretch) and unstable (sid) distributions, this problem has been fixed in version 5.5.2-1. We recommend that you upgrade your collectd packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJXnE8ZAAoJEBC+iYPz1Z1kjHYH/RVFFPKTDqsH7h+aRFBRV9e9 rU2h5MMHaJ47LMEqjUplOh9ztHNEhZc02p/lDKL+gTYG+RJR4SmQt59VrQ/NNPJH QS1BAoXX1nDWkWKtyY1dJHKm5KF/4zQRkVf5GocaIdklcdV5LmbagNJiFOW50pzL Wyr7lzt4QMV5pgjNTnedXWNX4GrGS8dIqQuV7zW+rWjchihX/iMcHVMq8wpjze6p zqvGjMk0sYAj9+ZmEl9fwanJd3sr+9rD0O0fqojaNyA+y8NY9Q+SDr0kSd61FXDV JBn5FaSM8Zh1CwUHEylAIxPtb99g10tUnR+RMp6eyYiwyH/6I8YX1L8r3N0iN/Y= =DNAO -----END PGP SIGNATURE-----
Powered by blists - more mailing lists