Lucene search

K
mageiaGentoo FoundationMGASA-2014-0515
HistoryDec 09, 2014 - 11:12 p.m.

Updated openafs packages fix security vulnerabilies

2014-12-0923:12:41
Gentoo Foundation
advisories.mageia.org
3

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.3 Low

EPSS

Percentile

97.0%

Updated openafs packages fix security vulnerabilities: Buffer overflow in the GetStatistics64 remote procedure call (RPC) in OpenAFS before 1.6.7 allows remote attackers to cause a denial of service (crash) via a crafted statsVersion argument (CVE-2014-0159). OpenAFS before 1.6.7 delays the listen thread when an RXS_CheckResponse fails, which allows remote attackers to cause a denial of service (performance degradation) via an invalid packet (CVE-2014-2852). OpenAFS 1.6.8 does not properly clear the fields in the host structure, which allows remote attackers to cause a denial of service (uninitialized memory access and crash) via unspecified vectors related to TMAY requests (CVE-2014-4044). The OpenAFS package has been updated to version 1.6.10, fixing these issues and other bugs, as well as providing support for newer kernel versions.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchopenafs<Β 1.6.10-1.1openafs-1.6.10-1.1.mga4

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.3 Low

EPSS

Percentile

97.0%