-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3636-1 security@xxxxxxxxxx https://www.debian.org/security/ Sebastien Delafond July 30, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : collectd CVE ID : CVE-2016-6254 Debian Bug : 832507 832577 Emilien Gaspar discovered that collectd, a statistics collection and monitoring daemon, incorrectly processed incoming network packets. This resulted in a heap overflow, allowing a remote attacker to either cause a DoS via application crash, or potentially execute arbitrary code. Additionally, security researchers at Columbia University and the University of Virginia discovered that collectd failed to verify a return value during initialization. This meant the daemon could sometimes be started without the desired, secure settings. For the stable distribution (jessie), this problem has been fixed in version 5.4.1-6+deb8u1. For the testing (stretch) and unstable (sid) distributions, this problem has been fixed in version 5.5.2-1. We recommend that you upgrade your collectd packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJXnE8ZAAoJEBC+iYPz1Z1kjHYH/RVFFPKTDqsH7h+aRFBRV9e9 rU2h5MMHaJ47LMEqjUplOh9ztHNEhZc02p/lDKL+gTYG+RJR4SmQt59VrQ/NNPJH QS1BAoXX1nDWkWKtyY1dJHKm5KF/4zQRkVf5GocaIdklcdV5LmbagNJiFOW50pzL Wyr7lzt4QMV5pgjNTnedXWNX4GrGS8dIqQuV7zW+rWjchihX/iMcHVMq8wpjze6p zqvGjMk0sYAj9+ZmEl9fwanJd3sr+9rD0O0fqojaNyA+y8NY9Q+SDr0kSd61FXDV JBn5FaSM8Zh1CwUHEylAIxPtb99g10tUnR+RMp6eyYiwyH/6I8YX1L8r3N0iN/Y= =DNAO -----END PGP SIGNATURE-----