OpenAFS Security Advisories 2013-001 and 2013-002
Bug #1145560 reported by
Luke Faraone
This bug affects 4 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openafs (Ubuntu) |
Fix Released
|
High
|
Luke Faraone | ||
Hardy |
Invalid
|
High
|
Unassigned | ||
Lucid |
Fix Released
|
High
|
Unassigned | ||
Oneiric |
Invalid
|
High
|
Luke Faraone | ||
Precise |
Fix Released
|
High
|
Luke Faraone | ||
Quantal |
Fix Released
|
High
|
Luke Faraone |
Bug Description
To quote Debian:
Multiple buffer overflows were discovered in OpenAFS, the implementation
of the distributed filesystem AFS, which might result in denial of
service or the execution of arbitrary code.
Changed in openafs (Ubuntu): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Quantal): | |
status: | New → Triaged |
Changed in openafs (Ubuntu Precise): | |
status: | New → Triaged |
Changed in openafs (Ubuntu Oneiric): | |
status: | New → Triaged |
Changed in openafs (Ubuntu Precise): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Quantal): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Hardy): | |
status: | New → Triaged |
Changed in openafs (Ubuntu Lucid): | |
status: | New → Triaged |
Changed in openafs (Ubuntu Hardy): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Lucid): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Oneiric): | |
importance: | Undecided → High |
Changed in openafs (Ubuntu Quantal): | |
status: | Triaged → In Progress |
status: | In Progress → Triaged |
Changed in openafs (Ubuntu Precise): | |
assignee: | nobody → Luke Faraone (lfaraone) |
status: | Triaged → In Progress |
Changed in openafs (Ubuntu Oneiric): | |
status: | In Progress → Invalid |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res