aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 23fa6a9d3a0d..57276c27613e 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,40 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="017a493f-7db6-11e5-a762-14dae9d210b8">
+ <topic>openafs -- information disclosure</topic>
+ <affects>
+ <package>
+ <name>openafs</name>
+ <range><lt>1.6.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenAFS development team reports:</p>
+ <blockquote cite="http://openafs.org/pages/security/OPENAFS-SA-2015-007.txt">
+ <p>When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx
+ implementations do not initialize three octets of data that are padding
+ in the C language structure and were inadvertently included in the wire
+ protocol (CVE-2015-7762). Additionally, OpenAFS Rx in versions 1.5.75
+ through 1.5.78, 1.6.0 through 1.6.14, and 1.7.0 through 1.7.32 include
+ a variable-length padding at the end of the ACK packet, in an attempt to
+ detect the path MTU, but only four octets of the additional padding are
+ initialized (CVE-2015-7763).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://openafs.org/pages/security/OPENAFS-SA-2015-007.txt</url>
+ <cvename>CVE-2015-7762</cvename>
+ <cvename>CVE-2015-7763</cvename>
+ </references>
+ <dates>
+ <discovery>2015-10-28</discovery>
+ <entry>2015-10-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="4b9393b8-7c0c-11e5-a010-080027ddead3">
<topic>xscreensaver - lock bypass</topic>
<affects>