Source: fastnetmon
Version: 1.2.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for fastnetmon.

CVE-2024-56072[0]:
| An issue was discovered in FastNetMon Community Edition through
| 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial
| of service (application crash) via a crafted packet that specifies
| many sFlow samples.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-56072
    https://www.cve.org/CVERecord?id=CVE-2024-56072
[1] 
https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000
[2] 
https://github.com/pavel-odintsov/fastnetmon/commit/65c40ee92dd5bcad1ab52cbafa1afd62cf669e48

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to