{"id":"UBUNTU-CVE-2017-16820","details":"The csnmp_read_table function in snmp.c in the SNMP plugin in collectd before 5.6.3 is susceptible to a double free in a certain error case, which could lead to a crash (or potentially have other impact).","modified":"2026-02-04T03:32:07.828678Z","published":"2017-11-14T21:29:00Z","related":["USN-4793-1"],"upstream":["CVE-2017-16820"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16820"},{"type":"REPORT","url":"https://github.com/collectd/collectd/issues/2291"},{"type":"REPORT","url":"https://bugs.debian.org/881757"},{"type":"REPORT","url":"https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47"},{"type":"REPORT","url":"https://github.com/collectd/collectd/releases/tag/collectd-5.6.3"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-16820"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4793-1"}],"affected":[{"package":{"name":"collectd","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/collectd@5.4.0-3ubuntu2.2+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.4.0-3ubuntu2.2+esm1"}]}],"versions":["5.1.0-3.1ubuntu3","5.1.0-3.1ubuntu4","5.4.0-3ubuntu1","5.4.0-3ubuntu2","5.4.0-3ubuntu2.1","5.4.0-3ubuntu2.2"],"ecosystem_specific":{"binaries":[{"binary_name":"collectd","binary_version":"5.4.0-3ubuntu2.2+esm1"},{"binary_name":"collectd-core","binary_version":"5.4.0-3ubuntu2.2+esm1"},{"binary_name":"collectd-dev","binary_version":"5.4.0-3ubuntu2.2+esm1"},{"binary_name":"collectd-utils","binary_version":"5.4.0-3ubuntu2.2+esm1"},{"binary_name":"libcollectdclient-dev","binary_version":"5.4.0-3ubuntu2.2+esm1"},{"binary_name":"libcollectdclient1","binary_version":"5.4.0-3ubuntu2.2+esm1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-16820.json"}},{"package":{"name":"collectd","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/collectd@5.5.1-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.5.1-1ubuntu0.1~esm1"}]}],"versions":["5.4.1-6ubuntu1","5.5.0-4","5.5.1-1","5.5.1-1build1","5.5.1-1build2"],"ecosystem_specific":{"binaries":[{"binary_name":"collectd","binary_version":"5.5.1-1ubuntu0.1~esm1"},{"binary_name":"collectd-core","binary_version":"5.5.1-1ubuntu0.1~esm1"},{"binary_name":"collectd-dev","binary_version":"5.5.1-1ubuntu0.1~esm1"},{"binary_name":"collectd-utils","binary_version":"5.5.1-1ubuntu0.1~esm1"},{"binary_name":"libcollectdclient-dev","binary_version":"5.5.1-1ubuntu0.1~esm1"},{"binary_name":"libcollectdclient1","binary_version":"5.5.1-1ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-16820.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}