openafs (1.6.9-2+deb8u3) jessie-security; urgency=high
- * Apply upstream security deltas from the 1.6.13 release:
- - 14a4e5bf OPENAFS-SA-2015-001: vos leaks stack data onto the wire
- when creating vldb entries
- - eea46650 OPENAFS-SA-2015-002: bos commands can be spoofed, including
- some which alter server state
- - d4cd5780 OPENAFS-SA-2015-003: pioctls leak kernel memory contents
- - 06a5b0bd OPENAFS-SA-2015-004: kernel pioctl support for OSD command
- parsing can trigger a panic
- - 63087b33 OPENAFS-SA-2015-006: Buffer overflow in OpenAFS vlserver
+ * Apply upstream security patches from the 1.6.13 release (thanks to
+ Benjamin Kaduk <kaduk@mit.edu> for providing the patches):
+ - OPENAFS-SA-2015-001 (CVE-2015-3282): vos leaks stack data onto the wire when creating
+ vldb entries
+ - OPENAFS-SA-2015-002 (CVE-2015-3283): bos commands can be spoofed, including some
+ which alter server state
+ - OPENAFS-SA-2015-003 (CVE-2015-3284): pioctls leak kernel memory contents
+ - OPENAFS-SA-2015-004 (CVE-2015-3285): kernel pioctl support for OSD command parsing
+ can trigger a panic
+ - OPENAFS-SA-2015-006 (CVE-2015-3287): Buffer overflow in OpenAFS vlserver
* The patch for OPENAFS-SA-2015-005 is not applied, since that
vulnerability is limited to the Solaris kernel module
- -- Benjamin Kaduk <kaduk@mit.edu> Thu, 30 Jul 2015 02:47:21 -0400
+ -- Sebastien Delafond <seb@debian.org> Thu, 30 Jul 2015 11:53:25 +0200
openafs (1.6.9-2+deb8u2) testing; urgency=high