CVE-2016-6254

Priority
Description
Heap-based buffer overflow in the parse_packet function in network.c in
collectd before 5.4.3 and 5.x before 5.5.2 allows remote attackers to cause
a denial of service (daemon crash) or possibly execute arbitrary code via a
crafted network packet.
Ubuntu-Description
It was discovered that collectd mishandled certain malformed packets. A remote
attacker could use this vulnerablility to cause collectd to crash or possibly
execuite arbitrary code.
Notes
Package
Upstream:released (5.5.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (5.7.2-2ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (5.7.2-2ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (5.7.2-2ubuntu1)
More Information

Updated: 2020-04-24 03:32:47 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)