MGASA-2023-0027 - Updated netatalk packages fix security vulnerability Publication date: 07 Feb 2023 URL: https://advisories.mageia.org/MGASA-2023-0027.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-31439, CVE-2022-0194, CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124, CVE-2022-23125, CVE-2022-45188 Heap overflow leading to arbitrary code execution. (CVE-2021-31439) Buffer overflow leading to remote code execution (CVE-2022-0194) Improper length validation leading to remote code execution (CVE-2022-23121) Buffer overflow leading to remote code execution (CVE-2022-23122) Out-of-bounds read leading to information disclosure (CVE-2022-23123) Out-of-bounds read leading to information disclosure (CVE-2022-23124) Improper length validation leading to remote code execution (CVE-2022-23125) Heap-based buffer overflow in afp_getappl resulting in code execution via a crafted .appl file (CVE-2022-45188) References: - https://bugs.mageia.org/show_bug.cgi?id=31255 - https://lists.suse.com/pipermail/sle-security-updates/2022-December/013205.html - https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html - https://github.com/Netatalk/Netatalk/commit/895cecbeeae655b2793df6fcbf9df1c1bfbe285d - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31439 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0194 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23121 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23122 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23123 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23124 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23125 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45188 SRPMS: - 8/core/netatalk-3.1.14-1.1.mga8