UbuntuUpdates.org

Package "openafs-fuse"

Name: openafs-fuse

Description:

AFS distributed file system experimental FUSE client

Latest version: 1.6.1-1+ubuntu0.7
Release: precise (12.04)
Level: security
Repository: universe
Head package: openafs
Homepage: http://www.openafs.org/

Links


Download "openafs-fuse"


Other versions of "openafs-fuse" in Precise

Repository Area Version
base universe 1.6.1-1
updates universe 1.6.1-1+ubuntu0.7
backports universe 1.6.7-1ubuntu1~ubuntu12.04.1

Changelog

Version: 1.6.1-1+ubuntu0.7 2015-11-05 22:07:02 UTC

  openafs (1.6.1-1+ubuntu0.7) precise-security; urgency=low

  * SECURITY UPDATE: Apply OPENAFS-SA-2015-007 "Tattletale" patch
    (LP: #1513461)
    - OPENAFS-SA-2015-007.patch: Rx ACK packets leak plaintext of previous
      packets
    - CVE-2015-7762
    - CVE-2015-7763

 -- Klas Mattsson Thu, 05 Nov 2015 12:50:39 +0100

Source diff to previous version
1513461 OPENAFS-SA-2015-007 \

Version: 1.6.1-1+ubuntu0.6 2015-08-08 00:06:43 UTC

  openafs (1.6.1-1+ubuntu0.6) precise-security; urgency=low

  * SECURITY UPDATE: Merge security patches from Debian git master
      (LP: #1481373)
    - CVE-2015-3282.patch: vos leaks stack data onto the wire in the clear
      when creating vldb entries
    - CVE-2015-3283.patch: bos commands can be spoofed, including some which
      alter server state
    - CVE-2015-3284.patch: pioctls leak kernel memory contents
    - CVE-2015-3285.patch: kernel pioctl support for OSD command passing can
      trigger a panic
    - CVE-2015-3287.patch: Buffer overflow in OpenAFS vlserver

 -- Patrik Lundin Fri, 07 Aug 2015 15:27:00 +0200

Source diff to previous version
1481373 Security bugs \

Version: 1.6.1-1+ubuntu0.5 2015-02-09 11:06:38 UTC

  openafs (1.6.1-1+ubuntu0.5) precise; urgency=low

  * Upstream v3.2.66 porting (LP: #1416375):
    - 'd_alias' member of struct dentry has been moved into the 'd_u' union
  * Dropped 'single-debian-patch' from debian/source/options
 -- Luis Henriques <email address hidden> Thu, 05 Feb 2015 12:44:14 -0600

Source diff to previous version
1416375 openafs-modules-dkms fails to build with latest Precise kernel

Version: 1.6.1-1+ubuntu0.4 2014-04-11 05:06:38 UTC

  openafs (1.6.1-1+ubuntu0.4) precise-security; urgency=low

  * SECURITY UPDATE: Merge security patches from Debian Wheezy:
    - OPENAFS-SA-2014-001: Fix potential buffer overflow in the
      fileserver. (CVE-2014-0159)
    - Fix a potential DoS attack against Rx servers by avoiding suspending
      the listener thread when delaying connection abort messages.
    - Debian patches and above descriptions from <email address hidden>.
    - LP: #1305807
 -- Patrik Lundin <email address hidden> Thu, 10 Apr 2014 17:17:53 +0200

Source diff to previous version
1305807 DSA-2899-1 openafs -- security update
CVE-2014-0159 OPENAFS-SA-2014-001

Version: 1.6.1-1+ubuntu0.2 2013-07-25 07:06:56 UTC

  openafs (1.6.1-1+ubuntu0.2) precise-security; urgency=low

  * SECURITY UPDATE: Brute force DES attack permits compromise of AFS cell.
    vos -encrypt doesn't encrypt connection data.
    Buffer overflows which could cause a serverside denial of service.
    - openafs-sa-2013-001.patch: Fix fileserver buffer overflow when parsing
      client-supplied ACL entries and protect against client parsing of
      bad ACL entries. Thanks to Nickolai Zeldovich.
    - openafs-sa-2013-002.patch: Fix ptserver buffer overflow via integer
      overflow in the IdToName RPC. Thanks to Nickolai Zeldovich
    - 0001-Add-rxkad-server-hook-function-to-decrypt-more-types.patch
    - 0002-New-optional-rxkad-functionality-for-decypting-krb5-.patch
    - 0003-Integrate-keytab-based-decryption-into-afsconf_Build.patch
    - 0004-Derive-DES-fcrypt-session-key-from-other-key-types.patch
    - 0005-Move-akimpersonate-to-libauth.patch
    - 0006-Clean-up-akimpersonate-and-use-for-server-to-server.patch
    - 0007-auth-Do-not-always-fallback-to-noauth.patch
    - 0008-Avoid-calling-afsconf_GetLatestKey-directly.patch
    - 0009-Reload-rxkad.keytab-on-CellServDB-modification.patch
    - 0010-Add-support-for-deriving-DES-keys-to-klog.krb5.patch
    - 0011 skipped because it was a version bump
    - 0012-ubik-Fix-encryption-selection-in-ugen.patch
    - Thanks to Chaskiel Grundman, Alexander Chernyakhovsky, Ben Kaduk,
        Andrew Deason, and Michael Meffie for the above patch series.
    - swap-libs.patch: Resolve FTBFS with newer toolchains. Thanks to Anders
        Kaseorg.
    - OPENAFS-SA-2013-001
    - OPENAFS-SA-2013-002
    - OPENAFS-SA-2013-003
    - OPENAFS-SA-2013-004
    - CVE-2013-1794
    - CVE-2013-1795
    - CVE-2013-4134
    - CVE-2013-4135
    - LP: #1145560
    - LP: #1204195
 -- Luke Faraone <email address hidden> Tue, 23 Jul 2013 21:11:02 -0400

1145560 OpenAFS Security Advisories 2013-001 and 2013-002
1204195 OpenAFS Security Advisories 2013-0003 and 2013-0004
CVE-2013-1794 Buffer overflows in OpenAFS fileserver
CVE-2013-1795 Buffer overflow in OpenAFS ptserver



About   -   Send Feedback to @ubuntu_updates