Debian DSA-3569-1 : openafs - security update

high Nessus Plugin ID 90928

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities were discovered in openafs, an implementation of the distributed filesystem AFS. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-8312 Potential denial of service caused by a bug in the pioctl logic allowing a local user to overrun a kernel buffer with a single NUL byte.

- CVE-2016-2860 Peter Iannucci discovered that users from foreign Kerberos realms can create groups as if they were administrators.

Solution

Upgrade the openafs packages.

For the stable distribution (jessie), these problems have been fixed in version 1.6.9-2+deb8u5.

See Also

https://security-tracker.debian.org/tracker/CVE-2015-8312

https://security-tracker.debian.org/tracker/CVE-2016-2860

https://packages.debian.org/source/jessie/openafs

https://www.debian.org/security/2016/dsa-3569

Plugin Details

Severity: High

ID: 90928

File Name: debian_DSA-3569.nasl

Version: 1.8

Type: local

Agent: unix

Published: 5/6/2016

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openafs, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 5/5/2016

Reference Information

CVE: CVE-2015-8312, CVE-2016-2860

DSA: 3569