Home / mailingsPDF  

[USN-7966-2] Telegraf vulnerabilities

Posted on 19 January 2026
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-7966-2
January 19, 2026

telegraf vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Telegraf

Software Description:
- telegraf: Agent for collecting, processing, aggregating, and writing metrics, logs, and other arbitrary data.

Details:

USN-7966-1 fixed vulnerabilities in Snowflake. This update provides the
corresponding updates for Telegraf.

Original advisory details:

It was discovered that Pion DTLS, vendored in Telegraf, did not impose a limit
on the amount of data that was buffered during the handshake. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29189)

It was discovered that Pion DTLS, vendored in Telegraf, did not prevent the
fragmentBuffer from processing zero length fragments. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29190)

It was discovered that Pion DTLS, vendored in Telegraf, did not require
CertificateVerify when Client Cert was sent. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29222)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
telegraf 1.21.4+ds1-0ubuntu2+esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7966-2
https://ubuntu.com/security/notices/USN-7966-1
CVE-2022-29189, CVE-2022-29190, CVE-2022-29222

--===============4541798483994447648==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP