Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/inetutils@2:1.5.dfsg.1-2
purl pkg:deb/debian/inetutils@2:1.5.dfsg.1-2
Next non-vulnerable version 2:2.4-2+deb12u3
Latest non-vulnerable version 2:2.6-3+deb13u3
Risk 10.0
Vulnerabilities affecting this package (12)
Vulnerability Summary Fixed by
VCID-6xfm-qpgd-ebaw
Aliases:
CVE-2026-28372
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
VCID-8491-mjp3-bqbv
Aliases:
CVE-2022-39028
krb5-appl: NULL pointer dereference
2:2.0-1+deb11u2
Affected by 4 other vulnerabilities.
VCID-8mwn-2k1d-rkfz
Aliases:
CVE-2014-3634
Multiple vulnerabilities have been found in RSYSLOG, allowing attackers to cause Denial of Service.
2:1.9.2.39.3a460-3
Affected by 9 other vulnerabilities.
VCID-bn6y-snuj-gbdy
Aliases:
CVE-2026-24061
A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
VCID-eq37-ztb2-nfb8
Aliases:
CVE-2021-40491
The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.
2:2.0-1+deb11u2
Affected by 4 other vulnerabilities.
VCID-hm61-cd18-hycu
Aliases:
CVE-2026-32746
telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
VCID-m459-kwuf-2kd4
Aliases:
CVE-2023-40303
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
2:2.0-1+deb11u2
Affected by 4 other vulnerabilities.
VCID-nes3-sr2e-yueb
Aliases:
CVE-2010-2529
This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2011. The worst of these vulnerabilities could lead to local privilege escalation and remote code execution. Please see the package list and CVE identifiers below for more information.
2:1.9-2
Affected by 10 other vulnerabilities.
VCID-qg9t-d2pk-yub6
Aliases:
CVE-2019-0053
Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
2:2.0-1+deb11u2
Affected by 4 other vulnerabilities.
VCID-um87-6yps-cbfk
Aliases:
CVE-2020-10188
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
2:2.0-1+deb11u2
Affected by 4 other vulnerabilities.
VCID-unvx-tsxw-abbw
Aliases:
CVE-2011-4862
A boundary error in Heimdal could result in execution of arbitrary code.
2:1.9-2
Affected by 10 other vulnerabilities.
VCID-wfv6-euzm-7bhc
Aliases:
CVE-2026-32772
telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T01:18:02.013466+00:00 Debian Oval Importer Affected by VCID-6xfm-qpgd-ebaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:47.067232+00:00 Debian Oval Importer Affected by VCID-wfv6-euzm-7bhc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:22.143797+00:00 Debian Oval Importer Affected by VCID-hm61-cd18-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:54:55.921085+00:00 Debian Oval Importer Affected by VCID-8mwn-2k1d-rkfz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:53:18.723946+00:00 Debian Oval Importer Affected by VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:16:42.348743+00:00 Debian Oval Importer Affected by VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:20:47.727042+00:00 Debian Oval Importer Affected by VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:52:01.984668+00:00 Debian Oval Importer Affected by VCID-nes3-sr2e-yueb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:40:21.154372+00:00 Debian Oval Importer Affected by VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:52:02.053776+00:00 Debian Oval Importer Affected by VCID-unvx-tsxw-abbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:04:44.318088+00:00 Debian Oval Importer Affected by VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:07:45.756197+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T10:15:27.544373+00:00 Debian Oval Importer Affected by VCID-6xfm-qpgd-ebaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:12.870369+00:00 Debian Oval Importer Affected by VCID-wfv6-euzm-7bhc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:14:47.698486+00:00 Debian Oval Importer Affected by VCID-hm61-cd18-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:29:12.145808+00:00 Debian Oval Importer Affected by VCID-8mwn-2k1d-rkfz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:27:39.549484+00:00 Debian Oval Importer Affected by VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:52:24.081919+00:00 Debian Oval Importer Affected by VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:58:13.814618+00:00 Debian Oval Importer Affected by VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:36:32.868827+00:00 Debian Oval Importer Affected by VCID-nes3-sr2e-yueb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:24:49.379345+00:00 Debian Oval Importer Affected by VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:38:00.140566+00:00 Debian Oval Importer Affected by VCID-unvx-tsxw-abbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:51:15.065203+00:00 Debian Oval Importer Affected by VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:55:16.011956+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:02:08.072466+00:00 Debian Oval Importer Affected by VCID-8mwn-2k1d-rkfz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:00:40.338690+00:00 Debian Oval Importer Affected by VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:26:55.227917+00:00 Debian Oval Importer Affected by VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:35:25.882592+00:00 Debian Oval Importer Affected by VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:21:38.620194+00:00 Debian Oval Importer Affected by VCID-nes3-sr2e-yueb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:10:44.649566+00:00 Debian Oval Importer Affected by VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:25:26.541515+00:00 Debian Oval Importer Affected by VCID-unvx-tsxw-abbw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:41:17.419166+00:00 Debian Oval Importer Affected by VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:48:29.960802+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0