You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa netatalk

Sigurnosni nedostatak programskog paketa netatalk

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for netatalk
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4287-1
Rating: important
References: #1119540
Cross-References: CVE-2018-1160
Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for netatalk fixes the following issues:

Security issue fixed:

– CVE-2018-1160 Fixed a missing bounds check in the handling of the DSI
OPEN SESSION request, which allowed an unauthenticated to overwrite
memory with data of their choice leading for arbitrary code execution
with root privileges. (bsc#1119540)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1614=1

Package List:

– openSUSE Leap 42.3 (i586 x86_64):

libatalk16-3.1.7-8.3.1
libatalk16-debuginfo-3.1.7-8.3.1
netatalk-3.1.7-8.3.1
netatalk-debuginfo-3.1.7-8.3.1
netatalk-debugsource-3.1.7-8.3.1
netatalk-devel-3.1.7-8.3.1

References:

https://www.suse.com/security/cve/CVE-2018-1160.html
https://bugzilla.suse.com/1119540


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa tinc

Otkriveni su sigurnosni nedostaci u programskom paketu tinc za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje "MitM"i "timing"...

Close