A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.CreditsArjun Basnet from SecurinReferenceshttps://netatalk.io/security/CVE-2026-44062