OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
{ "binaries": [ { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "libafsauthent1" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "libafsrpc1" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "libkopenafs1" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "libopenafs-dev" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "libpam-openafs-kaserver" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-client" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-dbserver" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-fileserver" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-fuse" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-kpasswd" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-krb5" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-modules-dkms" }, { "binary_version": "1.6.15-1ubuntu1.1", "binary_name": "openafs-modules-source" } ] }