Description
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
No analysis available yet.
Remediation
Vendor Solution
Upgrade goflow at least to version 3.4.4
Vendor Workaround
Make sure that the goflow collector is not publicly reachable.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7068 | sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service. |
Github GHSA |
GHSA-9rpw-2h95-666c | Cloudflare GoFlow vulnerable to a Denial of Service in the sflow packet handling package |
References
History
Tue, 20 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2025-05-20T16:03:07.474Z
Reserved: 2022-07-25T00:00:00.000Z
Link: CVE-2022-2529
Updated: 2024-08-03T00:39:08.043Z
Status : Modified
Published: 2022-09-30T11:15:09.353
Modified: 2024-11-21T07:01:11.843
Link: CVE-2022-2529
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA