Debian LTS: DLA-1982-1: openafs security update
Summary
OpenAFS is prone to denial of service from unserialized data access
because remote attackers can make a series of VOTE_Debug RPC calls
to crash a database server within the SVOTE_Debug RPC handler.
CVE-2019-18602
OpenAFS is prone to an information disclosure vulnerability because
uninitialized scalars are sent over the network to a peer.
CVE-2019-18603
OpenAFS is prone to information leakage upon certain error
conditions because uninitialized RPC output variables are sent over
the network to a peer.
For Debian 8 "Jessie", these problems have been fixed in version
1.6.9-2+deb8u9.
We recommend that you upgrade your openafs packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS