An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory.
References
Link | Resource |
---|---|
http://openafs.org/pages/security/OPENAFS-SA-2018-002.txt | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4302 | Third Party Advisory |
http://openafs.org/pages/security/OPENAFS-SA-2018-002.txt | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4302 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://openafs.org/pages/security/OPENAFS-SA-2018-002.txt - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00024.html - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4302 - Third Party Advisory |
Information
Published : 2018-09-12 01:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16948
Mitre link : CVE-2018-16948
CVE.ORG link : CVE-2018-16948
JSON object : View
Products Affected
debian
- debian_linux
openafs
- openafs
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor