lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 05 May 2016 13:29:05 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3569-1] openafs security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3569-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 05, 2016                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openafs
CVE ID         : CVE-2015-8312 CVE-2016-2860

Two vulnerabilities were discovered in openafs, an implementation of the
distributed filesystem AFS. The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2015-8312

    Potential denial of service caused by a bug in the pioctl
    logic allowing a local user to overrun a kernel buffer with a
    single NUL byte.

CVE-2016-2860

    Peter Iannucci discovered that users from foreign Kerberos realms
    can create groups as if they were administrators.

For the stable distribution (jessie), these problems have been fixed in
version 1.6.9-2+deb8u5.

For the testing distribution (stretch), these problems have been fixed
in version 1.6.17-1.

For the unstable distribution (sid), these problems have been fixed in
version 1.6.17-1.

We recommend that you upgrade your openafs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJXK0qJAAoJEAVMuPMTQ89EzVcP/0UFZXYyXBiGiAZIDvgwywpv
B6hpogo0qYhd1bnH1DsTkPCiSskeZYdOpKltmP9n3ZLTjgwnI141TWjJ5zY4WndX
bF10PIs+1ANTxjaBln3yyhW4z5sT8G/x8UB19MVa4VaPfLVkKAQe/Wpl4aknRlPN
e7gvgOX/ySyKeXjcJKxEYh4ZdrHDswxN1DcWtZ9utRrTNN1tNSGbge0s8hfokTTM
Pos1ti1qE+/Cjan8oWZs3DPuPQ0EGsfqlZQJ9nzua69GYimGKLRPNP+ZnO7nPrmr
a1PU6xZcvmJTyR5BNogvyP+JeDbUAI5w8z9XTXVe6X0xb7wNW9KZ8U6G2qkLvoyh
DQOVlVuTQoBUNWzrD+tFqXRsAw2deF609DEk202IQju8rTEIz/i59BAo/rVembvm
arRaLd8fPa5dQF3AHoO3HGv6CLjyUHVUpMUrVDIqy5yuZzIpXcZ80oJEnnIZfFH7
30ES/P/md9FA/1tFgeyjEk6njODrneiJX+VFLg7XSLvVk6TQkArN3bzUw/FjOCb9
hBARaPWYbkMzWrgyGt9CfWuMq4bVs4SPjJMXbQUerg8VKtUrXWtS9dIlcDYtUzkb
enumS0/z0AGiaaTFZHW6yPcnPHYY4oVuFp1a7+MBHxV+A2S39Q/nSowlCF+Ynr+k
bHepMjMReHm3Nfev98fR
=2t+J
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ