Package: netatalk
Version: 3.1.18~ds-1+b2
Severity: critical
Tags: patch security upstream
Justification: root security hole
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>

This vulnerability in Netatalk arises due to a lack of validation for the 
length field after parsing user-provided data, leading to an out-of-bounds heap 
write of one byte (\0). Under specific configurations, this can result in 
reading metadata of the next heap block, potentially causing a Denial of 
Service (DoS) under certain heap layouts or with ASAN enabled.

The upstream project has issued a patch and fixed version 3.2.1:

https://netatalk.io/security/CVE-2024-38440
https://github.com/Netatalk/netatalk/commit/77b5d99007cfef4d73d76fd6f0c26584891608e5.diff
https://github.com/Netatalk/netatalk/releases/tag/netatalk-3-2-1

Reply via email to