Netatalk 3.1.2 through 4.4.2 is compiled without FORTIFY_SOURCE, which disables built-in buffer overflow detection at runtime, potentially allowing a remote attacker to cause a minor denial of service via memory errors that would otherwise be caught and safely terminated by runtime protection.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://netatalk.io/security/CVE-2026-44071 |
|
History
Thu, 21 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Netatalk 3.1.2 through 4.4.2 is compiled without FORTIFY_SOURCE, which disables built-in buffer overflow detection at runtime, potentially allowing a remote attacker to cause a minor denial of service via memory errors that would otherwise be caught and safely terminated by runtime protection. | |
| Title | FORTIFY_SOURCE disabled | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: securin
Published:
Updated: 2026-05-21T08:23:40.856Z
Reserved: 2026-05-05T07:25:20.196Z
Link: CVE-2026-44071
No data.
Status : Received
Published: 2026-05-21T09:16:29.340
Modified: 2026-05-21T09:16:29.340
Link: CVE-2026-44071
No data.
OpenCVE Enrichment
Updated: 2026-05-21T10:30:08Z
Weaknesses