Source: fastnetmon Version: 1.2.7-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for fastnetmon. CVE-2024-56072[0]: | An issue was discovered in FastNetMon Community Edition through | 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial | of service (application crash) via a crafted packet that specifies | many sFlow samples. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-56072 https://www.cve.org/CVERecord?id=CVE-2024-56072 [1] https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000 [2] https://github.com/pavel-odintsov/fastnetmon/commit/65c40ee92dd5bcad1ab52cbafa1afd62cf669e48 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

