|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2015-0424|
|Summary:||Mageia Linux Local Security Checks mgasa-2015-0424|
Mageia Linux Local Security Checks mgasa-2015-0424
Updated openafs packages fix security vulnerabilities: When constructing an Rx acknowledgment (ACK) packet, Andrew-derived Rx implementations do not initialize three octets of data that are padding in the C language structure and were inadvertently included in the wire protocol (CVE-2015-7762). Additionally, OpenAFS Rx before version 1.6.14 includes a variable-length padding at the end of the ACK packet, in an attempt to detect the path MTU, but only four octets of the additional padding are initialized (CVE-2015-7763).
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2015-7762|
Debian Security Information: DSA-3387 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2015-7763
|Copyright||Copyright (C) 2015 Eero Volotinen|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.