Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet. Upstream bug: https://github.com/collectd/collectd/issues/2174
Created collectd tracking bugs for this issue: Affects: epel-6 [bug 1439687] Affects: epel-7 [bug 1439686] Affects: fedora-all [bug 1439688] Created puppet-collectd tracking bugs for this issue: Affects: openstack-rdo [bug 1439689]
upstream fix: https://github.com/collectd/collectd/commit/f6be4f9b49b949b379326c3d7002476e6ce4f211
can we please get a tracking bug for collectd in osp optools? I've already built it on CentOS Opstools SIG https://github.com/centos-opstools/collectd/commit/cfb313abc992b3139fbc740c38311b3fde1d5707 and http://cbs.centos.org/koji/buildinfo?buildID=17012
Bronce, https://mojo.redhat.com/docs/DOC-1100973 is not complete, missing the Build Strategy. https://errata.devel.redhat.com/advisory/25569 is not marked as multi product errata so we need a tracking bug for RHV 4.1 as well.
Here's the errata for collectd to be shipped in 4.1.z: https://errata.devel.redhat.com/advisory/28330 Build: collectd-5.7.1-3.el7 ready on Tag: rhlog-1.0-rhel-7-candidate it required also: riemann-c-client-1.6.1-4.el7 ready on Tag: rhlog-1.0-rhel-7-candidate
This issue has been addressed in the following products: RHEV Engine version 4.1 RHEV 4.X RHEV-H and Agents for RHEL-7 Via RHSA-2017:1285 https://access.redhat.com/errata/RHSA-2017:1285
This issue has been addressed in the following products: Red Hat OpenStack Platform 11.0 Operational Tools for RHEL 7 Via RHSA-2017:1787 https://access.redhat.com/errata/RHSA-2017:1787
This issue has been addressed in the following products: Red Hat Gluster Storage 3.4 for RHEL 7 Via RHSA-2018:2615 https://access.redhat.com/errata/RHSA-2018:2615