Updated netatalk packages fix security vulnerability
Publication date: 07 Feb 2023Type: security
Affected Mageia releases : 8
CVE: CVE-2021-31439 , CVE-2022-0194 , CVE-2022-23121 , CVE-2022-23122 , CVE-2022-23123 , CVE-2022-23124 , CVE-2022-23125 , CVE-2022-45188
Description
Heap overflow leading to arbitrary code execution. (CVE-2021-31439) Buffer overflow leading to remote code execution (CVE-2022-0194) Improper length validation leading to remote code execution (CVE-2022-23121) Buffer overflow leading to remote code execution (CVE-2022-23122) Out-of-bounds read leading to information disclosure (CVE-2022-23123) Out-of-bounds read leading to information disclosure (CVE-2022-23124) Improper length validation leading to remote code execution (CVE-2022-23125) Heap-based buffer overflow in afp_getappl resulting in code execution via a crafted .appl file (CVE-2022-45188)
References
- https://bugs.mageia.org/show_bug.cgi?id=31255
- https://lists.suse.com/pipermail/sle-security-updates/2022-December/013205.html
- https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html
- https://github.com/Netatalk/Netatalk/commit/895cecbeeae655b2793df6fcbf9df1c1bfbe285d
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45188
SRPMS
8/core
- netatalk-3.1.14-1.1.mga8