Hello Tyler,

This is correct, the diffs were created by doing "git show <hash>"
against the relevant commits against the master branch on the mentioned
git repo. I then applied those diffs with patch(1) against the unpacked
debian package:

CVE-2015-3282.patch: 14a4e5bf9ec05946f67123531d6c64a612919e8c
CVE-2015-3283.patch: eea466507af6320c35e3e8dc751da60a52b15a23
CVE-2015-3284.patch: d4cd57807660a6fd3b47bc83de14a78fa8292a5f
CVE-2015-3285.patch: 06a5b0bd91f3ec6efad8b21831b4d1ec1a0f5003
CVE-2015-3287.patch: 63087b338e3d0fbbb26ee183a039052bf07aaaec

It is worth noting that while the master branch also includes a fix for
CVE-2015-3286, this only affects solaris, and has not been added to the
wheezy branch. For this reason I have skipped that one (It is not
mentioned in the DSA either).

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3286

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481373

Title:
  Security bugs "DSA-3320-1 openafs -- security update"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openafs/+bug/1481373/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to