[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 2638-1] openafs security update

Spiros, please read the manual before you subscribe. It's below every TS email.

To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Met vriendelijke groet,
Kees de Jong

De informatie opgenomen in deze e-mail kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde(n).
Indien u deze e-mail onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door de e-mail te retourneren.
Aan deze e-mail inclusief de bijlagen kunnen geen rechten ontleend worden, tenzij schriftelijk anders wordt overeengekomen.
The information contained in this e-mail may be confidential and is intended to be exclusively for the addressee(s).
Should you receive this e-mail unintentionally, please do not use the contents herein and notify the sender immediately by return e-mail.
This e-mail including the attachments are not legally binding, unless otherwise agreed upon in writing.
My public GPG key: 0E503889

On Mon, Mar 4, 2013 at 11:32 PM, Spiros Denaxas <s.denaxas@gmail.com> wrote:

On Mon, Mar 4, 2013 at 10:30 PM, Moritz Muehlenhoff <jmm@debian.org> wrote:
> Hash: SHA1
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2638-1                   security@debian.org
> http://www.debian.org/security/                        Moritz Muehlenhoff
> March 04, 2013                         http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
> Package        : openafs
> Vulnerability  : buffer overflow
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2013-1794 CVE-2013-1795
> Multiple buffer overflows were discovered in OpenAFS, the implementation
> of the distributed filesystem AFS, which might result in denial of
> service or the execution of arbitrary code. Further information is
> available at http://www.openafs.org/security.
> For the stable distribution (squeeze), this problem has been fixed in
> version
> For the unstable distribution (sid), this problem has been fixed in
> version 1.6.1-3.
> We recommend that you upgrade your openafs packages.
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
> Mailing list: debian-security-announce@lists.debian.org
> Version: GnuPG v1.4.12 (GNU/Linux)
> iEYEARECAAYFAlE1ICcACgkQXm3vHE4uylrOlQCg6kwBRETO/tr5SfUk1GrFtubp
> =rU8A
> --
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> Archive: http://lists.debian.org/20130304223008.GA5658@pisco.westfalen.local

To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: [🔎] CAO6Zhu0h5ed8NpnHH-8jS_H0ShA8xe+KH1r_WcYso53avKpHaQ@mail.gmail.com" target="_blank">http://lists.debian.org/[🔎] CAO6Zhu0h5ed8NpnHH-8jS_H0ShA8xe+KH1r_WcYso53avKpHaQ@mail.gmail.com

Reply to: