CVE-2015-7762

NameCVE-2015-7762
Descriptionrx/rx.c in OpenAFS before 1.6.15 and 1.7.x before 1.7.33 does not properly initialize the padding of a data structure when constructing an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-342-1, DSA-3387-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openafs (PTS)jessie, jessie (lts)1.6.9-2+deb8u9fixed
stretch (security), stretch (lts), stretch1.6.20-2+deb9u2fixed
buster1.8.2-1+deb10u1fixed
bullseye1.8.6-5fixed
bookworm1.8.9-1fixed
sid1.8.12.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openafssourcesqueeze1.4.12.1+dfsg-4+squeeze4DLA-342-1
openafssourcewheezy1.6.1-3+deb7u5DSA-3387-1
openafssourcejessie1.6.9-2+deb8u4DSA-3387-1
openafssource(unstable)1.6.15-1

Notes

https://www.openafs.org/security

Search for package or bug name: Reporting problems