OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openafs | Openafs | * | 1.6.24 (excluding) |
Openafs | Openafs | 1.8.0 (including) | 1.8.5 (excluding) |
Openafs | Ubuntu | bionic | * |
Openafs | Ubuntu | disco | * |
Openafs | Ubuntu | eoan | * |
Openafs | Ubuntu | esm-apps/bionic | * |
Openafs | Ubuntu | esm-apps/focal | * |
Openafs | Ubuntu | esm-apps/jammy | * |
Openafs | Ubuntu | esm-apps/xenial | * |
Openafs | Ubuntu | focal | * |
Openafs | Ubuntu | groovy | * |
Openafs | Ubuntu | hirsute | * |
Openafs | Ubuntu | impish | * |
Openafs | Ubuntu | jammy | * |
Openafs | Ubuntu | kinetic | * |
Openafs | Ubuntu | trusty | * |
Openafs | Ubuntu | upstream | * |
Openafs | Ubuntu | xenial | * |