Debian dsa-62801 : a2boot - security update

critical Nessus Plugin ID 315215

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-62801 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6280-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff May 18, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : netatalk CVE ID : CVE-2026-44047 CVE-2026-44048 CVE-2026-44049 CVE-2026-44050 CVE-2026-44051 CVE-2026-44052 CVE-2026-44054 CVE-2026-44055 CVE-2026-44057 CVE-2026-44060 CVE-2026-44062 CVE-2026-44064 CVE-2026-44066 CVE-2026-44068 CVE-2026-44076 CVE-2026-45354 CVE-2026-45355 CVE-2026-45356 CVE-2026-45698 CVE-2026-45699

Multiple security vulnerabilities were found in Netatalk, an implementation of the Apple Filing Protocol (AFP), which could result in denial of service, information disclosure or the execution of arbitrary code.

For the stable distribution (trixie), these problems have been fixed in version 4.2.3~ds-1+deb13u2.

We recommend that you upgrade your netatalk packages.

For the detailed security status of netatalk please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/netatalk

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the a2boot packages.

See Also

https://security-tracker.debian.org/tracker/source-package/netatalk

https://security-tracker.debian.org/tracker/CVE-2026-44047

https://security-tracker.debian.org/tracker/CVE-2026-44048

https://security-tracker.debian.org/tracker/CVE-2026-44049

https://security-tracker.debian.org/tracker/CVE-2026-44050

https://security-tracker.debian.org/tracker/CVE-2026-44051

https://security-tracker.debian.org/tracker/CVE-2026-44052

https://security-tracker.debian.org/tracker/CVE-2026-44054

https://security-tracker.debian.org/tracker/CVE-2026-44055

https://security-tracker.debian.org/tracker/CVE-2026-44057

https://security-tracker.debian.org/tracker/CVE-2026-44060

https://security-tracker.debian.org/tracker/CVE-2026-44062

https://security-tracker.debian.org/tracker/CVE-2026-44064

https://security-tracker.debian.org/tracker/CVE-2026-44066

https://security-tracker.debian.org/tracker/CVE-2026-44068

https://security-tracker.debian.org/tracker/CVE-2026-44076

https://security-tracker.debian.org/tracker/CVE-2026-45354

https://security-tracker.debian.org/tracker/CVE-2026-45355

https://security-tracker.debian.org/tracker/CVE-2026-45356

https://security-tracker.debian.org/tracker/CVE-2026-45698

https://security-tracker.debian.org/tracker/CVE-2026-45699

https://packages.debian.org/source/trixie/netatalk

Plugin Details

Severity: Critical

ID: 315215

File Name: debian_DSA-62801.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/18/2026

Updated: 5/18/2026

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2026-45699

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:netatalk, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:a2boot, p-cpe:/a:debian:debian_linux:atalkd, p-cpe:/a:debian:debian_linux:libatalk, p-cpe:/a:debian:debian_linux:libatalk-dev, p-cpe:/a:debian:debian_linux:macipgw, p-cpe:/a:debian:debian_linux:netatalk-doc, p-cpe:/a:debian:debian_linux:netatalk-tests, p-cpe:/a:debian:debian_linux:netatalk-tools, p-cpe:/a:debian:debian_linux:papd, p-cpe:/a:debian:debian_linux:timelord

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 5/18/2026

Vulnerability Publication Date: 5/18/2026

Reference Information

CVE: CVE-2026-44047, CVE-2026-44048, CVE-2026-44049, CVE-2026-44050, CVE-2026-44051, CVE-2026-44052, CVE-2026-44054, CVE-2026-44055, CVE-2026-44057, CVE-2026-44060, CVE-2026-44062, CVE-2026-44064, CVE-2026-44066, CVE-2026-44068, CVE-2026-44076, CVE-2026-45354, CVE-2026-45355, CVE-2026-45356, CVE-2026-45698, CVE-2026-45699