Debian DSA-3569-1 : openafs - security update

high Nessus Plugin ID 90928


The remote Debian host is missing a security-related update.


Two vulnerabilities were discovered in openafs, an implementation of the distributed filesystem AFS. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-8312 Potential denial of service caused by a bug in the pioctl logic allowing a local user to overrun a kernel buffer with a single NUL byte.

- CVE-2016-2860 Peter Iannucci discovered that users from foreign Kerberos realms can create groups as if they were administrators.


Upgrade the openafs packages.

For the stable distribution (jessie), these problems have been fixed in version 1.6.9-2+deb8u5.

See Also

Plugin Details

Severity: High

ID: 90928

File Name: debian_DSA-3569.nasl

Version: 1.8

Type: local

Agent: unix

Published: 5/6/2016

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:openafs, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 5/5/2016

Reference Information

CVE: CVE-2015-8312, CVE-2016-2860

DSA: 3569