Home / vulnerabilitiesPDF  

Debian Security Advisory 3320-1

Posted on 03 August 2015
Source : packetstormsecurity.org Link

 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3320-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
July 30, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openafs
CVE ID : CVE-2015-3282 CVE-2015-3283 CVE-2015-3284 CVE-2015-3285
CVE-2015-3287

It was discovered that OpenAFS, the implementation of the distributed
filesystem AFS, contained several flaws that could result in
information leak, denial-of-service or kernel panic.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.6.1-3+deb7u3.

For the stable distribution (jessie), these problems have been fixed in
version 1.6.9-2+deb8u3.

We recommend that you upgrade your openafs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCgAGBQJVug6sAAoJEBC+iYPz1Z1kz+kIAKTX5q9GSKOuTljGXoBREZo4
SXFNsKGUPFvSEzvcYEbQ0wYaS0DMv/LJYvwyac+KgoMKJPLSiAG1RybkjeIloE/4
wbXrlCS/r7F9M/qFYOaOlr076BNPxERS3YBhwNI5bNNfqimVrJiRF1TUY+og0qul
cqED9sAazr4xE+vDo2tF0s0JRPiV1FnI9SMdXnoLgpXOLb3UrpJuhUSUI7gJ1PNr
pqp0TenHQscrK6AyWIQYQUlxOl+gJhxpIOpJp+Z6UQlAy+Jz85FIya3BgTDYxB90
IlgZ3NG2UTUWH0Fg384vsR41mElEM+Wn987OiVPGdrffKNMg/URUfuU6V9X0TU4=
=EAi5
-----END PGP SIGNATURE-----

 

TOP