First published: Wed Dec 06 2017(Updated: )
OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openafs Openafs | >=1.0<1.6.22 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/openafs | 1.8.2-1+deb10u1 1.8.6-5 1.8.9-1 1.8.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.