[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 2638-1] openafs security update



Spiros, please read the manual before you subscribe. It's below every TS email.

To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org





--
Met vriendelijke groet,
Kees de Jong


De informatie opgenomen in deze e-mail kan vertrouwelijk zijn en is uitsluitend bestemd voor de geadresseerde(n).
Indien u deze e-mail onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en de afzender direct te informeren door de e-mail te retourneren.
Aan deze e-mail inclusief de bijlagen kunnen geen rechten ontleend worden, tenzij schriftelijk anders wordt overeengekomen.
--
The information contained in this e-mail may be confidential and is intended to be exclusively for the addressee(s).
Should you receive this e-mail unintentionally, please do not use the contents herein and notify the sender immediately by return e-mail.
This e-mail including the attachments are not legally binding, unless otherwise agreed upon in writing.
--
My public GPG key: 0E503889


On Mon, Mar 4, 2013 at 11:32 PM, Spiros Denaxas <s.denaxas@gmail.com> wrote:
unsubscribe

On Mon, Mar 4, 2013 at 10:30 PM, Moritz Muehlenhoff <jmm@debian.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2638-1                   security@debian.org
> http://www.debian.org/security/                        Moritz Muehlenhoff
> March 04, 2013                         http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : openafs
> Vulnerability  : buffer overflow
> Problem type   : remote
> Debian-specific: no
> CVE ID         : CVE-2013-1794 CVE-2013-1795
>
> Multiple buffer overflows were discovered in OpenAFS, the implementation
> of the distributed filesystem AFS, which might result in denial of
> service or the execution of arbitrary code. Further information is
> available at http://www.openafs.org/security.
>
> For the stable distribution (squeeze), this problem has been fixed in
> version 1.4.12.1+dfsg-4+squeeze1.
>
> For the unstable distribution (sid), this problem has been fixed in
> version 1.6.1-3.
>
> We recommend that you upgrade your openafs packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: debian-security-announce@lists.debian.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
>
> iEYEARECAAYFAlE1ICcACgkQXm3vHE4uylrOlQCg6kwBRETO/tr5SfUk1GrFtubp
> YPMAnA+FqS0AWVLBYzT69pNaOW4ULfA8
> =rU8A
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> Archive: http://lists.debian.org/20130304223008.GA5658@pisco.westfalen.local
>


--
To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: [🔎] CAO6Zhu0h5ed8NpnHH-8jS_H0ShA8xe+KH1r_WcYso53avKpHaQ@mail.gmail.com" target="_blank">http://lists.debian.org/[🔎] CAO6Zhu0h5ed8NpnHH-8jS_H0ShA8xe+KH1r_WcYso53avKpHaQ@mail.gmail.com



Reply to: