Branches for Dapper

Name Status Last Modified Last Commit
lp:ubuntu/dapper/openafs 2 Mature 2011-03-25 03:23:18 UTC
11. * Exit successfully in the openafs-cl...

Author: Russ Allbery
Revision Date: 2006-04-15 15:47:04 UTC

* Exit successfully in the openafs-client init script if no module is
  installed, since otherwise openafs-client will fail to install until
  one builds a module. This restores previous accidental behavior due
  to a bug in debhelper. (Closes: #362695)
* libopenafs-dev must conflict with liblwp-dev since they both provide
  liblwp.a. Thanks, Justin Pryzby. (Closes: #362842)
* openafs-client recommends lsof, since the init script uses it for
  cleaner shutdown.

lp:ubuntu/dapper-security/openafs 2 Mature 2009-07-20 16:18:29 UTC
8. * Apply upstream security patches fro...

Author: Evan Broder
Revision Date: 2009-04-16 11:16:19 UTC

* Apply upstream security patches from 1.4.9 (LP: #356861, #180792,
  #94787):
    - OPENAFS-SA-2007-001: Avoid a potential privilege escalation from a
      spoofed setuid file by disabling setuid on all cells by default.
      (CVE-2007-1507)
    - OPENAFS-SA-2007-003: Avoid a potential denial of service against an
      AFS fileserver. (CVE-2007-6599)
    - OPENAFS-SA-2009-001: Avoid a potential kernel memory overrun if more
      items than requested are returned from an InlineBulk or BulkStatus
      message. (CVE-2009-1251)
    - OPENAFS-SA-2009-002: Avoid converting negative errors into invalid
      kernel memory pointers. (CVE-2009-1250)

lp:ubuntu/dapper-updates/openafs bug 2 Mature 2009-07-20 16:20:31 UTC
8. * Apply upstream security patches fro...

Author: Evan Broder
Revision Date: 2009-04-16 11:16:19 UTC

* Apply upstream security patches from 1.4.9 (LP: #356861, #180792,
  #94787):
    - OPENAFS-SA-2007-001: Avoid a potential privilege escalation from a
      spoofed setuid file by disabling setuid on all cells by default.
      (CVE-2007-1507)
    - OPENAFS-SA-2007-003: Avoid a potential denial of service against an
      AFS fileserver. (CVE-2007-6599)
    - OPENAFS-SA-2009-001: Avoid a potential kernel memory overrun if more
      items than requested are returned from an InlineBulk or BulkStatus
      message. (CVE-2009-1251)
    - OPENAFS-SA-2009-002: Avoid converting negative errors into invalid
      kernel memory pointers. (CVE-2009-1250)

13 of 3 results