OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libafsauthent2", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libafsauthent2-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libafsrpc2", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libafsrpc2-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libkopenafs2", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libkopenafs2-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libopenafs-dev", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "libopenafs-dev-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-client", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-client-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-dbserver", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-dbserver-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-doc", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-fileserver", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-fileserver-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-fuse", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-fuse-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-krb5", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-krb5-dbgsym", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-modules-dkms", "binary_version": "1.8.0~pre5-1" }, { "binary_name": "openafs-modules-source", "binary_version": "1.8.0~pre5-1" } ] }