Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.6.7-1", "binary_name": "libafsauthent1" }, { "binary_version": "1.6.7-1", "binary_name": "libafsrpc1" }, { "binary_version": "1.6.7-1", "binary_name": "libkopenafs1" }, { "binary_version": "1.6.7-1", "binary_name": "libopenafs-dev" }, { "binary_version": "1.6.7-1", "binary_name": "libpam-openafs-kaserver" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-client" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-dbg" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-dbserver" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-doc" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-fileserver" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-fuse" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-kpasswd" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-krb5" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-modules-dkms" }, { "binary_version": "1.6.7-1", "binary_name": "openafs-modules-source" } ] }