-
Notifications
You must be signed in to change notification settings - Fork 0
/
support.html.in
156 lines (148 loc) · 4.85 KB
/
support.html.in
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
<div id="content">
<h1>Support</h1>
<h2>Bug Reports</h2>
<p>If you think you have found a bug in Netatalk, first see if the bug has already been reported in the
<a href="https://github.com/Netatalk/netatalk/issues">Netatalk issue tracker at GitHub</a>.</p>
<p>If no similar bug has been reported yet, please create a new ticket and provide as much context as possible,
including Netatalk version, OS version, contents of configuration files, and debug or backtrace logs.</p>
<p>Feature requests can also be filed via the same issue tracker.</p>
<h2>Technical Support</h2>
<p>If you want to get help from the Netatalk developers or the community, or simply want to share a cool idea,
you can start a new topic at <a href="https://github.com/Netatalk/netatalk/discussions">Netatalk Discussions</a> at GitHub.
Please don't forget to be courteous and mindful of others.</p>
<h2>Mailing Lists</h2>
<p>As an alternative to GitHub, you can join the
<a href="https://sourceforge.net/p/netatalk/mailman/netatalk-admins/">netatalk-admins mailing list</a>.
New release announcements are posted here as well.</p>
<h2>Security Advisories</h2>
<p>The Netatalk Project takes cyber security very seriously.
In this section we publish security advisories when vulnerabilities have been disclosed and fixed.</p>
<p>If you think you have found a new exploit in Netatalk, please file a
<a href="https://github.com/Netatalk/netatalk/security/advisories/new">
new security vulnerability report</a> via GitHub. This enables us to collaborate on a patch in private.</p>
<table summary="Security patch list">
<tr>
<th>CVE ID</th>
<th>Subject</th>
<th>Publish Date</th>
<th>Affected Versions</th>
</tr>
<tr>
<td><a href="/security/CVE-2024-38441.html">CVE-2024-38441</a></td>
<td>Heap out-of-bounds write in directory.c</td>
<td>2024/06/28</td>
<td>3.2.0<br>
3.0.0 - 3.1.18<br>
2.0.0 - 2.4.0</td>
</tr>
<tr>
<td><a href="/security/CVE-2024-38440.html">CVE-2024-38440</a></td>
<td>Heap out-of-bounds write in uams_dhx_pam.c</td>
<td>2024/06/28</td>
<td>3.2.0<br>
3.0.0 - 3.1.18<br>
1.5.0 - 2.4.0</td>
</tr>
<tr>
<td><a href="/security/CVE-2024-38439.html">CVE-2024-38439</a></td>
<td>Heap out-of-bounds write in uams_pam.c</td>
<td>2024/06/28</td>
<td>3.2.0<br>
3.0.0 - 3.1.18<br>
1.5.0 - 2.4.0</td>
</tr>
<tr>
<td><a href="/security/CVE-2023-42464.html">CVE-2023-42464</a></td>
<td>afpd daemon vulnerable to type confusion</td>
<td>2023/09/17</td>
<td>3.1.0 - 3.1.16</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-45188.html">CVE-2022-45188</a></td>
<td>Arbitrary code execution in afp_getappl</td>
<td>2023/03/26</td>
<td>3.0.0 - 3.1.14<br>
1.5.0 - 2.2.8</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-43634.html">CVE-2022-43634</a></td>
<td>Arbitrary code execution in dsi_writeinit</td>
<td>2023/02/06</td>
<td>3.0.0 - 3.1.14</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-23125.html">CVE-2022-23125</a></td>
<td>Arbitrary code execution in copyapplfile</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12<br>
- 2.2.6</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-23124.html">CVE-2022-23124</a></td>
<td>Information leak in get_finderinfo</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-23123.html">CVE-2022-23123</a></td>
<td>Information leak in getdirparams</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12<br>
1.5.0 - 2.2.6</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-23122.html">CVE-2022-23122</a></td>
<td>Arbitrary code execution in setfilparams</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-23121.html">CVE-2022-23121</a></td>
<td>Arbitrary code execution in parse_entries</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12<br>
1.5.0 - 2.2.6</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-22995.html">CVE-2022-22995</a></td>
<td>afpd daemon vulnerable to symlink redirection</td>
<td>2023/10/05</td>
<td>3.1.0 - 3.1.17</td>
</tr>
<tr>
<td><a href="/security/CVE-2022-0194.html">CVE-2022-0194</a></td>
<td>Arbitrary code execution in ad_addcomment</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12<br>
1.5.0 - 2.2.6</td>
</tr>
<tr>
<td><a href="/security/CVE-2021-31439.html">CVE-2021-31439</a></td>
<td>Arbitrary code execution in dsi_stream_receive</td>
<td>2022/03/21</td>
<td>3.0.0 - 3.1.12</td>
</tr>
<tr>
<td><a href="/security/CVE-2018-1160.html">CVE-2018-1160</a></td>
<td>Unauthenticated remote code execution</td>
<td>2018/12/13</td>
<td>3.0.0 - 3.1.11<br>
1.5.0 - 2.2.6</td>
</tr>
<tr>
<td><a href="/security/CVE-2008-5718.html">CVE-2008-5718</a></td>
<td>papd daemon vulnerable to remote command execution</td>
<td>2009/11/10</td>
<td>2.0.0 - 2.0.4</td>
</tr>
<tr>
<td><a href="/security/CVE-2004-0974.html">CAN-2004-0974</a></td>
<td>etc2ps.sh vulnerable to symlink attack</td>
<td>2004/10/24</td>
<td>2.0.0<br>
- 1.6.4</td>
</tr>
</table>
<h3>See Also</h3>
<a href="https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=netatalk">Netatalk CVE advisory archives on cve.mitre.org</a>
</div>