The OpenAFS maintainers are happy to announce the availability of
Security Releases OpenAFS 1.8.13 and OpenAFS 1.6.25.
Source files can be accessed via the web at:

       https://www.openafs.org/release/openafs-1.8.13.html
       https://www.openafs.org/release/openafs-1.6.25.html

or via AFS at:

       UNIX: /afs/grand.central.org/software/openafs/1.8.13/
       UNC: \\afs\grand.central.org\software\openafs\1.8.13\
       UNIX: /afs/grand.central.org/software/openafs/1.6.25/
       UNC: \\afs\grand.central.org\software\openafs\1.6.25\

These releases include fixes for three security advisories:
   http://openafs.org/pages/security/OPENAFS-SA-2024-001.txt
   http://openafs.org/pages/security/OPENAFS-SA-2024-002.txt
   http://openafs.org/pages/security/OPENAFS-SA-2024-003.txt

OPENAFS-SA-2024-001 affects cache managers where PAGs are in use; an attacker
with access to a multi-user system could retrieve and use credentials from a
preexisting PAG they are not authorized to access.

OPENAFS-SA-2024-002 affects fileservers, with denial of service and potential
information disclosure from uninitialized memory access being possible due to
improper string handling in processing the RXAFS_StoreACL RPC.  Analogous
impact to clients is possible due to improper string handling in processing
the results of the RXAFS_FetchACL RPC.

OPENAFS-SA-2024-003 is a buffer overflow affecting certain RPC clients
(notably, cache manager and command-line client utilities).  Errors and
denial of service (crashes) are the most common failure modes, though for this
class of memory-safety issue there is some potential that heap manipulation
could allow remote code execution.

Bug reports should be filed to openafs-b...@openafs.org.

Benjamin Kaduk
for the OpenAFS maintainers

Attachment: signature.asc
Description: PGP signature

Reply via email to