Bug 2292817 (CVE-2024-38439, CVE-2024-38440, CVE-2024-38441) - CVE-2024-38439 CVE-2024-38441 CVE-2024-38440 netatalk: multiple vulnerabilities
Summary: CVE-2024-38439 CVE-2024-38441 CVE-2024-38440 netatalk: multiple vulnerabilities
Keywords:
Status: NEW
Alias: CVE-2024-38439, CVE-2024-38440, CVE-2024-38441
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2292818 2292819
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-06-18 03:21 UTC by Patrick Del Bello
Modified: 2024-06-29 16:25 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Patrick Del Bello 2024-06-18 03:21:00 UTC
Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[len] to '\0' in FPMapName in afp_mapname in etc/afp/directory.c.

https://github.com/Netatalk/netatalk/issues/1098


Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c.

https://github.com/Netatalk/netatalk/issues/1097

Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c.

https://github.com/Netatalk/netatalk/issues/1096

Comment 1 Patrick Del Bello 2024-06-18 03:21:33 UTC
Created netatalk tracking bugs for this issue:

Affects: epel-all [bug 2292819]
Affects: fedora-all [bug 2292818]

Comment 2 Andrew Bauer 2024-06-29 16:25:44 UTC
The github issues mentioned in this bug were moved to the Security tab of the upstream project:

CVE-2024-38439
https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc

CVE-2024-38440
https://github.com/Netatalk/netatalk/security/advisories/GHSA-mxx4-9fhm-r3w5

CVE-2024-38441
https://github.com/Netatalk/netatalk/security/advisories/GHSA-mj6v-cr68-mj9q


These have all been fixed in the 3.2.1 release. I will push new packages as soon as I am able (1-2 days).


Note You need to log in before you can comment on or make changes to this bug.