First published: Fri Sep 30 2022(Updated: )
### Impact The sflow decode package prior to version 3.4.4 does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service. ### Specific Go Packages Affected github.com/cloudflare/goflow/v3/decoders/sflow ### Patches Version 3.4.4 contains patches fixing this. ### Workarounds A possible workaround is to not have your goflow collector publicly reachable. ### For more information If you have any questions or comments about this advisory: * Open an issue in [goflow repo](https://github.com/cloudflare/goflow) * Email us [netdev[@]cloudflare.com ](mailto:netdev@cloudflare.com)
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cloudflare/goflow/v3 | <3.4.4 | 3.4.4 |
Cloudflare Goflow | <3.4.4 |
Upgrade goflow at least to version 3.4.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2529 is a vulnerability in the sflow decode package prior to version 3.4.4 that can be exploited to launch a denial of service attack by sending malicious packets, leading to excessive memory consumption.
The CVE-2022-2529 vulnerability can cause the affected software to consume significant amounts of memory, resulting in a denial of service, if it receives crafted and malformed packets.
CVE-2022-2529 has a severity rating of 7.5 (high).
The CVE-2022-2529 vulnerability affects the sflow decode package prior to version 3.4.4 and Cloudflare Goflow.
To mitigate the CVE-2022-2529 vulnerability, update the sflow decode package to version 3.4.4 or higher.