MGASA-2023-0027 - Updated netatalk packages fix security vulnerability

Publication date: 07 Feb 2023
URL: https://advisories.mageia.org/MGASA-2023-0027.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-31439,
     CVE-2022-0194,
     CVE-2022-23121,
     CVE-2022-23122,
     CVE-2022-23123,
     CVE-2022-23124,
     CVE-2022-23125,
     CVE-2022-45188

Heap overflow leading to arbitrary code execution. (CVE-2021-31439)
Buffer overflow leading to remote code execution (CVE-2022-0194)
Improper length validation leading to remote code execution
(CVE-2022-23121)
Buffer overflow leading to remote code execution (CVE-2022-23122)
Out-of-bounds read leading to information disclosure (CVE-2022-23123)
Out-of-bounds read leading to information disclosure (CVE-2022-23124)
Improper length validation leading to remote code execution
(CVE-2022-23125)
Heap-based buffer overflow in afp_getappl resulting in code execution via
a crafted .appl file (CVE-2022-45188)

References:
- https://bugs.mageia.org/show_bug.cgi?id=31255
- https://lists.suse.com/pipermail/sle-security-updates/2022-December/013205.html
- https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html
- https://github.com/Netatalk/Netatalk/commit/895cecbeeae655b2793df6fcbf9df1c1bfbe285d
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45188

SRPMS:
- 8/core/netatalk-3.1.14-1.1.mga8

Mageia 2023-0027: netatalk security update

Heap overflow leading to arbitrary code execution

Summary

Heap overflow leading to arbitrary code execution. (CVE-2021-31439) Buffer overflow leading to remote code execution (CVE-2022-0194) Improper length validation leading to remote code execution (CVE-2022-23121) Buffer overflow leading to remote code execution (CVE-2022-23122) Out-of-bounds read leading to information disclosure (CVE-2022-23123) Out-of-bounds read leading to information disclosure (CVE-2022-23124) Improper length validation leading to remote code execution (CVE-2022-23125) Heap-based buffer overflow in afp_getappl resulting in code execution via a crafted .appl file (CVE-2022-45188)

References

- https://bugs.mageia.org/show_bug.cgi?id=31255

- https://lists.suse.com/pipermail/sle-security-updates/2022-December/013205.html

- https://lists.suse.com/pipermail/sle-security-updates/2022-April/010700.html

- https://github.com/Netatalk/Netatalk/commit/895cecbeeae655b2793df6fcbf9df1c1bfbe285d

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31439

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0194

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23121

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23122

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23123

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23124

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23125

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45188

Resolution

MGASA-2023-0027 - Updated netatalk packages fix security vulnerability

SRPMS

- 8/core/netatalk-3.1.14-1.1.mga8

Severity
Publication date: 07 Feb 2023
URL: https://advisories.mageia.org/MGASA-2023-0027.html
Type: security
CVE: CVE-2021-31439, CVE-2022-0194, CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124, CVE-2022-23125, CVE-2022-45188

Related News