-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2899-1 email@example.com http://www.debian.org/security/ Thijs Kinkhorst April 09, 2014 http://www.debian.org/security/faq
Package : openafs CVE ID : CVE-2014-0159
Michael Meffie discovered that in OpenAFS, a distributed filesystem, an attacker with the ability to connect to an OpenAFS fileserver can trigger a buffer overflow, crashing the fileserver, and potentially permitting the execution of arbitrary code.
In addition, this update addresses a minor denial of service issue: the listerer thread of the server will hang for about one second when receiving an invalid packet, giving the opportunity to slow down the server to an unusable state by sending such packets.
For the oldstable distribution (squeeze), this problem has been fixed in version 188.8.131.52+dfsg-4+squeeze3.
For the stable distribution (wheezy), this problem has been fixed in version 1.6.1-3+deb7u2.
For the unstable distribution (sid), this problem has been fixed in version 1.6.7-1.
We recommend that you upgrade your openafs packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: firstname.lastname@example.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBAgAGBQJTRaJbAAoJEFb2GnlAHawEpjcH/jzwegY1uyCQPPtcY2AosXMs lMEpoZY+WwG+BndumUhzMmSDnp1AQ7XPg61DsJC5Pijwy8PfLGPeMrEOaE8d6MZk eHIJtT0UGbTUxBfb4JuL5dYfpb66p8ehLRffxdQUVGWj4hcP3F5vFwY4NLRsIHSC 0EjbzjiohbQCoyPoliaA9S5Q46ozcsswe7waH6Z9aOW2Gw6HmvAhXqPlk0f8+nx4 +ecAWBhvTy3Uo57IfApNQwEkQTsBnuwxkyCoZLbr3zwWR+leZIACC7+d8FcgavaA dSTpYmmOMoP/CrWxfM00WXY4BoNXjtDzz/0xzYy8NXir5dGPKfW/Kr2N0jyDyHo= =2x4m -----END PGP SIGNATURE-----