exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3569-1

Debian Security Advisory 3569-1
Posted May 5, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3569-1 - Two vulnerabilities were discovered in openafs, an implementation of the distributed filesystem AFS.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-8312, CVE-2016-2860
SHA-256 | 5350c2a92faea1a018856d55ceeb910ed1a5cb1a1a955764695eac0570e686d5

Debian Security Advisory 3569-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3569-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 05, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : openafs
CVE ID : CVE-2015-8312 CVE-2016-2860

Two vulnerabilities were discovered in openafs, an implementation of the
distributed filesystem AFS. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2015-8312

Potential denial of service caused by a bug in the pioctl
logic allowing a local user to overrun a kernel buffer with a
single NUL byte.

CVE-2016-2860

Peter Iannucci discovered that users from foreign Kerberos realms
can create groups as if they were administrators.

For the stable distribution (jessie), these problems have been fixed in
version 1.6.9-2+deb8u5.

For the testing distribution (stretch), these problems have been fixed
in version 1.6.17-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.6.17-1.

We recommend that you upgrade your openafs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=2t+J
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close