[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1ZKsZa-0004gN-Jq@pool.mine.nu>
Date: Thu, 30 Jul 2015 20:28:54 +0200
From: Sebastien Delafond <seb@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3320-1] openafs security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3320-1 security@...ian.org
https://www.debian.org/security/ Sebastien Delafond
July 30, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openafs
CVE ID : CVE-2015-3282 CVE-2015-3283 CVE-2015-3284 CVE-2015-3285
CVE-2015-3287
It was discovered that OpenAFS, the implementation of the distributed
filesystem AFS, contained several flaws that could result in
information leak, denial-of-service or kernel panic.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.6.1-3+deb7u3.
For the stable distribution (jessie), these problems have been fixed in
version 1.6.9-2+deb8u3.
We recommend that you upgrade your openafs packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCgAGBQJVug6sAAoJEBC+iYPz1Z1kz+kIAKTX5q9GSKOuTljGXoBREZo4
SXFNsKGUPFvSEzvcYEbQ0wYaS0DMv/LJYvwyac+KgoMKJPLSiAG1RybkjeIloE/4
wbXrlCS/r7F9M/qFYOaOlr076BNPxERS3YBhwNI5bNNfqimVrJiRF1TUY+og0qul
cqED9sAazr4xE+vDo2tF0s0JRPiV1FnI9SMdXnoLgpXOLb3UrpJuhUSUI7gJ1PNr
pqp0TenHQscrK6AyWIQYQUlxOl+gJhxpIOpJp+Z6UQlAy+Jz85FIya3BgTDYxB90
IlgZ3NG2UTUWH0Fg384vsR41mElEM+Wn987OiVPGdrffKNMg/URUfuU6V9X0TU4=
=EAi5
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists