Mageia 2023-0027: netatalk security update
Summary
Heap overflow leading to arbitrary code execution. (CVE-2021-31439)
Buffer overflow leading to remote code execution (CVE-2022-0194)
Improper length validation leading to remote code execution
(CVE-2022-23121)
Buffer overflow leading to remote code execution (CVE-2022-23122)
Out-of-bounds read leading to information disclosure (CVE-2022-23123)
Out-of-bounds read leading to information disclosure (CVE-2022-23124)
Improper length validation leading to remote code execution
(CVE-2022-23125)
Heap-based buffer overflow in afp_getappl resulting in code execution via
a crafted .appl file (CVE-2022-45188)
References
- https://bugs.mageia.org/show_bug.cgi?id=31255
- https://lists.suse.com/pipermail/sle-security-updates/2022-December/013205.html
- https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html
- https://github.com/Netatalk/Netatalk/commit/895cecbeeae655b2793df6fcbf9df1c1bfbe285d
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45188
Resolution
MGASA-2023-0027 - Updated netatalk packages fix security vulnerability
SRPMS
- 8/core/netatalk-3.1.14-1.1.mga8