aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorfeld <feld@FreeBSD.org>2015-10-29 04:59:22 +0800
committerfeld <feld@FreeBSD.org>2015-10-29 04:59:22 +0800
commit7799ac7d4da3c06ad7599064bedf5e99184d6122 (patch)
tree81dc42e275d1742fab7449a3afc88a3acd78e800
parent94f3e43aaab0f504e8b9a393b1119b5826866206 (diff)
downloadfreebsd-ports-gnome-7799ac7d4da3c06ad7599064bedf5e99184d6122.tar.gz
freebsd-ports-gnome-7799ac7d4da3c06ad7599064bedf5e99184d6122.tar.zst
freebsd-ports-gnome-7799ac7d4da3c06ad7599064bedf5e99184d6122.zip
Document information disclosure in net/openafs
Security: CVE-2015-7762 Security: CVE-2015-7763
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 23fa6a9d3a0d..57276c27613e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,40 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="017a493f-7db6-11e5-a762-14dae9d210b8">
+ <topic>openafs -- information disclosure</topic>
+ <affects>
+ <package>
+ <name>openafs</name>
+ <range><lt>1.6.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenAFS development team reports:</p>
+ <blockquote cite="http://openafs.org/pages/security/OPENAFS-SA-2015-007.txt">
+ <p>When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx
+ implementations do not initialize three octets of data that are padding
+ in the C language structure and were inadvertently included in the wire
+ protocol (CVE-2015-7762). Additionally, OpenAFS Rx in versions 1.5.75
+ through 1.5.78, 1.6.0 through 1.6.14, and 1.7.0 through 1.7.32 include
+ a variable-length padding at the end of the ACK packet, in an attempt to
+ detect the path MTU, but only four octets of the additional padding are
+ initialized (CVE-2015-7763).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://openafs.org/pages/security/OPENAFS-SA-2015-007.txt</url>
+ <cvename>CVE-2015-7762</cvename>
+ <cvename>CVE-2015-7763</cvename>
+ </references>
+ <dates>
+ <discovery>2015-10-28</discovery>
+ <entry>2015-10-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4b9393b8-7c0c-11e5-a010-080027ddead3">
<topic>xscreensaver - lock bypass</topic>
<affects>