ALT-BU-2022-7106-1
Branch sisyphus_mipsel update bulletin.
Package netatalk updated to version 3.1.13-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2025-01-14
CVE-2021-31439
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26
- https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26
- https://www.zerodayinitiative.com/advisories/ZDI-21-492/
- https://www.zerodayinitiative.com/advisories/ZDI-21-492/
Modified: 2024-11-21
CVE-2022-0194
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-530/
- https://www.zerodayinitiative.com/advisories/ZDI-22-530/
Modified: 2024-11-21
CVE-2022-23121
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230601 [SECURITY] [DLA 3426-2] netatalk regression update
- [debian-lts-announce] 20230601 [SECURITY] [DLA 3426-2] netatalk regression update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-527/
- https://www.zerodayinitiative.com/advisories/ZDI-22-527/
Modified: 2024-11-21
CVE-2022-23122
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-529/
- https://www.zerodayinitiative.com/advisories/ZDI-22-529/
Modified: 2024-11-21
CVE-2022-23123
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15830.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3426-3] netatalk regression update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3426-3] netatalk regression update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-528/
- https://www.zerodayinitiative.com/advisories/ZDI-22-528/
Modified: 2024-11-21
CVE-2022-23124
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15870.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-525/
- https://www.zerodayinitiative.com/advisories/ZDI-22-525/
Modified: 2024-11-21
CVE-2022-23125
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-526/
- https://www.zerodayinitiative.com/advisories/ZDI-22-526/
Package krb5 updated to version 1.19.4-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-06933
Уязвимость параметров PAC (Privileged Attribute Certificate) функции krb5_parse_pac пакетов Heimdal и MIT Kerberos программы сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-42898
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
- https://bugzilla.samba.org/show_bug.cgi?id=15203
- https://bugzilla.samba.org/show_bug.cgi?id=15203
- https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
- https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c
- https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
- https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583
- GLSA-202309-06
- GLSA-202309-06
- GLSA-202310-06
- GLSA-202310-06
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230223-0001/
- https://security.netapp.com/advisory/ntap-20230223-0001/
- https://web.mit.edu/kerberos/advisories/
- https://web.mit.edu/kerberos/advisories/
- https://web.mit.edu/kerberos/krb5-1.19/
- https://web.mit.edu/kerberos/krb5-1.19/
- https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
- https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt
- https://www.samba.org/samba/security/CVE-2022-42898.html
- https://www.samba.org/samba/security/CVE-2022-42898.html