OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.8.0~pre5-1", "binary_name": "libafsauthent2" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libafsauthent2-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libafsrpc2" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libafsrpc2-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libkopenafs2" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libkopenafs2-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libopenafs-dev" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "libopenafs-dev-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-client" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-client-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-dbserver" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-dbserver-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-doc" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-fileserver" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-fileserver-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-fuse" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-fuse-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-krb5" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-krb5-dbgsym" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-modules-dkms" }, { "binary_version": "1.8.0~pre5-1", "binary_name": "openafs-modules-source" } ] }