File _patchinfo of Package patchinfo.34547

<patchinfo incident="34547">
  <issue tracker="cve" id="2024-38440"/>
  <issue tracker="cve" id="2024-38441"/>
  <issue tracker="cve" id="2024-38439"/>
  <issue tracker="bnc" id="1226431">VUL-0: CVE-2024-38441: netatalk: off-by-one error resultant in a heap-based buffer overflow because of setting ibuf[len] to '\0' in FPMapName in afp_mapname in etc/afp/directory.c.</issue>
  <issue tracker="bnc" id="1226430">VUL-0: CVE-2024-38439: netatalk: off-by-one error resultant in a heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c.</issue>
  <issue tracker="bnc" id="1226429">VUL-0: CVE-2024-38440: netatalk: off-by-one error resultant in a heap-based buffer overflow because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c</issue>
  <packager>pgajdos</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for netatalk</summary>
  <description>This update for netatalk fixes the following issues:

- CVE-2024-38439: Fixed a heap buffer overflow because of setting
  ibuf[PASSWDLEN] to \0 in FPLoginExt in login in etc/uams/uams_pam.c
  (bsc#1226430).
- CVE-2024-38440: Fixed a heap buffer overflow because of incorrectly
  using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c
  (bsc#1226429).
- CVE-2024-38441: Fixed a heap buffer overflow because of setting
  ibuf[len] to \0 in FPMapName in afp_mapname in etc/afp/directory.c
  (bsc#1226431).
</description>
</patchinfo>
openSUSE Build Service is sponsored by