netatalk.io

Netatalk Security Advisory

Subject Heap buffer overflow in CNID daemon comm_rcv()
CVE ID# CVE-2026-44050
Severity Critical
Disclosure Date 2026/05/13
Affected Versions 2.0.0 - 4.4.2
Summary The CNID daemon trusts a request-supplied name length and reads attacker-controlled data into a fixed-size name buffer

Description

The CNID daemon trusts a client-controlled name length when receiving requests. A local client that can reach the CNID service may be able to overflow daemon memory and crash the service.

Patch Availability

Apply CVE-2026-44050.patch to a Netatalk 4.4.2 source tree to hotfix your local Netatalk deployment.

Alternatively, upgrade to Netatalk 4.4.3 or later, which includes the patch.

Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.

CVSS Calculation

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H (9.9)

Workaround

Use the sqlite CNID backend instead of dbd.

cnid scheme = sqlite

If you absolutely must use the dbd backend, restrict access to AFP and local CNID daemon sockets to trusted users and hosts until patched.

Credits

Vulnerability reported by:

@00redbeer

Patch developed by:

Daniel Markstedt of the Netatalk team

References


Go back to the Security Policy.