[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1768-1 openafs -- several

ID: oval:org.secpod.oval:def:600501Date: (C)2011-05-13   (M)2022-10-10
Class: PATCHFamily: unix




Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system. An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding. An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module. Note that in order to apply this security update, you must rebuild the OpenAFS kernel module. Be sure to also upgrade openafs-modules-source, build a new kernel module for your system following the instructions in /usr/share/doc/openafs-client/README.modules.gz, and then either stop and restart openafs-client or reboot the system to reload the kernel module. For the old stable distribution , these problems have been fixed in version 1.4.2-6etch2. For the stable distribution , these problems have been fixed in version 1.4.7.dfsg1-6+lenny1. For the unstable distribution , these problems have been fixed in version 1.4.10+dfsg1-1. We recommend that you upgrade your openafs packages.

Platform:
Debian 5.0
Debian 4.0
Product:
openafs
Reference:
DSA-1768-1
CVE-2009-1250
CVE-2009-1251
CVE    2
CVE-2009-1251
CVE-2009-1250
CPE    2
cpe:/o:debian:debian_linux:4.x
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies