OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
{
"binaries": [
{
"binary_name": "libafsauthent1",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "libafsrpc1",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "libkopenafs1",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "libopenafs-dev",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "libpam-openafs-kaserver",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-client",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-dbserver",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-fileserver",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-fuse",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-kpasswd",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-krb5",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-modules-dkms",
"binary_version": "1.6.15-1ubuntu1.1"
},
{
"binary_name": "openafs-modules-source",
"binary_version": "1.6.15-1ubuntu1.1"
}
]
}