File _patchinfo of Package patchinfo.34547
<patchinfo incident="34547">
<issue tracker="cve" id="2024-38440"/>
<issue tracker="cve" id="2024-38441"/>
<issue tracker="cve" id="2024-38439"/>
<issue tracker="bnc" id="1226431">VUL-0: CVE-2024-38441: netatalk: off-by-one error resultant in a heap-based buffer overflow because of setting ibuf[len] to '\0' in FPMapName in afp_mapname in etc/afp/directory.c.</issue>
<issue tracker="bnc" id="1226430">VUL-0: CVE-2024-38439: netatalk: off-by-one error resultant in a heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c.</issue>
<issue tracker="bnc" id="1226429">VUL-0: CVE-2024-38440: netatalk: off-by-one error resultant in a heap-based buffer overflow because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c</issue>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for netatalk</summary>
<description>This update for netatalk fixes the following issues:
- CVE-2024-38439: Fixed a heap buffer overflow because of setting
ibuf[PASSWDLEN] to \0 in FPLoginExt in login in etc/uams/uams_pam.c
(bsc#1226430).
- CVE-2024-38440: Fixed a heap buffer overflow because of incorrectly
using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c
(bsc#1226429).
- CVE-2024-38441: Fixed a heap buffer overflow because of setting
ibuf[len] to \0 in FPMapName in afp_mapname in etc/afp/directory.c
(bsc#1226431).
</description>
</patchinfo>