Hello Tyler, This is correct, the diffs were created by doing "git show <hash>" against the relevant commits against the master branch on the mentioned git repo. I then applied those diffs with patch(1) against the unpacked debian package:
CVE-2015-3282.patch: 14a4e5bf9ec05946f67123531d6c64a612919e8c CVE-2015-3283.patch: eea466507af6320c35e3e8dc751da60a52b15a23 CVE-2015-3284.patch: d4cd57807660a6fd3b47bc83de14a78fa8292a5f CVE-2015-3285.patch: 06a5b0bd91f3ec6efad8b21831b4d1ec1a0f5003 CVE-2015-3287.patch: 63087b338e3d0fbbb26ee183a039052bf07aaaec It is worth noting that while the master branch also includes a fix for CVE-2015-3286, this only affects solaris, and has not been added to the wheezy branch. For this reason I have skipped that one (It is not mentioned in the DSA either). ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-3286 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1481373 Title: Security bugs "DSA-3320-1 openafs -- security update" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openafs/+bug/1481373/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
