Описание
Security update for netatalk
This update for netatalk fixes the following issues:
- CVE-2022-23125: Fixed remote arbitrary code execution related to copyapplfile().
- CVE-2022-23121: Fixed remote arbitrary code execution related to parse_entries().
- CVE-2021-31439: Fixed remote arbitrary code execution related to dsi_stream_receive().
Список пакетов
SUSE Linux Enterprise Software Development Kit 12 SP5
SUSE Linux Enterprise Workstation Extension 12 SP5
Ссылки
- Link for SUSE-SU-2022:1184-1
- E-Mail link for SUSE-SU-2022:1184-1
- SUSE Security Ratings
- SUSE Bug 1197352
- SUSE CVE CVE-2021-31439 page
- SUSE CVE CVE-2022-23121 page
- SUSE CVE CVE-2022-23125 page
Описание
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.
Затронутые продукты
Ссылки
- CVE-2021-31439
- SUSE Bug 1197352
Описание
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.
Затронутые продукты
Ссылки
- CVE-2022-23121
- SUSE Bug 1197352
Описание
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.
Затронутые продукты
Ссылки
- CVE-2022-23125
- SUSE Bug 1197352