Summary: | net-fs/openafs : GetStatistics64 RPC Denial of Service Vulnerability (CVE-2014-0159) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | andrej.filipcic, bircoph, net-fs, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/57832/ | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 544158 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-04-11 15:38:46 UTC
See also bug #500378 CVE-2014-0159 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0159): Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS 1.4.8 before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument. Upstream patch: http://openafs.org/pages/security/openafs-sa-2014-001.patch, tested compilation Fixed version 1.6.11 is in tree. Old unstable versions are removed. Arch teams, please stabilize =net-fs/openafs-1.6.11. stabilization done in bug 536272 All vulnerable versions are removed from tree. Vote: NO. GLSA Vote: No |