CVE-2015-7763

Publication date 6 November 2015

Last updated 24 July 2024


Ubuntu priority

rx/rx.c in OpenAFS 1.5.75 through 1.5.78, 1.6.x before 1.6.15, and 1.7.x before 1.7.33 does not properly initialize padding at the end of an Rx acknowledgement (ACK) packet, which allows remote attackers to obtain sensitive information by (1) conducting a replay attack or (2) sniffing the network.

Status

Package Ubuntu Release Status
openafs 16.04 LTS xenial
Not affected
15.10 wily Ignored end of life
15.04 vivid Ignored end of life
14.04 LTS trusty
Fixed 1.6.7-1ubuntu1.1
12.04 LTS precise
Fixed 1.6.1-1+ubuntu0.7

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openafs