CVE-2017-17432

NameCVE-2017-17432
DescriptionOpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, which allows remote attackers to cause a denial of service (system crash or application crash) via crafted fields, as demonstrated by an integer underflow and assertion failure for a small MTU value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1213-1, DSA-4067-1
Debian Bugs883602

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openafs (PTS)jessie, jessie (lts)1.6.9-2+deb8u9fixed
stretch (security), stretch (lts), stretch1.6.20-2+deb9u2fixed
buster1.8.2-1+deb10u1fixed
bullseye1.8.6-5fixed
bookworm1.8.9-1fixed
sid1.8.13-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openafssourcewheezy1.6.1-3+deb7u8DLA-1213-1
openafssourcejessie1.6.9-2+deb8u6DSA-4067-1
openafssourcestretch1.6.20-2+deb9u1DSA-4067-1
openafssource(unstable)1.6.22-1883602

Notes

https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt

Search for package or bug name: Reporting problems