Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/inetutils@2:2.0-1%2Bdeb11u2
purl pkg:deb/debian/inetutils@2:2.0-1%2Bdeb11u2
Next non-vulnerable version 2:2.4-2+deb12u3
Latest non-vulnerable version 2:2.6-3+deb13u3
Risk 10.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-6xfm-qpgd-ebaw
Aliases:
CVE-2026-28372
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
VCID-bn6y-snuj-gbdy
Aliases:
CVE-2026-24061
A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
VCID-hm61-cd18-hycu
Aliases:
CVE-2026-32746
telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
VCID-wfv6-euzm-7bhc
Aliases:
CVE-2026-32772
telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.
2:2.4-2+deb12u1
Affected by 3 other vulnerabilities.
2:2.4-2+deb12u3
Affected by 0 other vulnerabilities.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-8491-mjp3-bqbv krb5-appl: NULL pointer dereference CVE-2022-39028
VCID-eq37-ztb2-nfb8 The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl. CVE-2021-40491
VCID-m459-kwuf-2kd4 GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process. CVE-2023-40303
VCID-qg9t-d2pk-yub6 Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. CVE-2019-0053
VCID-um87-6yps-cbfk telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code CVE-2020-10188

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:19:27.303542+00:00 Debian Importer Affected by VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:01.566244+00:00 Debian Importer Affected by VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:29:49.939107+00:00 Debian Importer Affected by VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T01:18:02.039648+00:00 Debian Oval Importer Affected by VCID-6xfm-qpgd-ebaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:47.094944+00:00 Debian Oval Importer Affected by VCID-wfv6-euzm-7bhc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T01:17:22.170553+00:00 Debian Oval Importer Affected by VCID-hm61-cd18-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:53:18.754554+00:00 Debian Oval Importer Fixing VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:16:42.372135+00:00 Debian Oval Importer Fixing VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:20:47.751831+00:00 Debian Oval Importer Fixing VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:40:21.183232+00:00 Debian Oval Importer Fixing VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:04:44.343001+00:00 Debian Oval Importer Fixing VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:07:45.779643+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-13T10:15:27.587081+00:00 Debian Oval Importer Affected by VCID-6xfm-qpgd-ebaw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:15:12.901546+00:00 Debian Oval Importer Affected by VCID-wfv6-euzm-7bhc https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T10:14:47.725612+00:00 Debian Oval Importer Affected by VCID-hm61-cd18-hycu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-13T07:42:21.963831+00:00 Debian Importer Affected by VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:59.442246+00:00 Debian Importer Affected by VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T23:27:39.577392+00:00 Debian Oval Importer Fixing VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:52:24.108475+00:00 Debian Oval Importer Fixing VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:58:13.838907+00:00 Debian Oval Importer Fixing VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:24:49.407621+00:00 Debian Oval Importer Fixing VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:20:02.589513+00:00 Debian Importer Affected by VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T16:51:15.094518+00:00 Debian Oval Importer Fixing VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:55:16.039743+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:00:40.367447+00:00 Debian Oval Importer Fixing VCID-m459-kwuf-2kd4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:26:55.258050+00:00 Debian Oval Importer Fixing VCID-8491-mjp3-bqbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:35:25.910418+00:00 Debian Oval Importer Fixing VCID-eq37-ztb2-nfb8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:07:15.518447+00:00 Debian Importer Affected by VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:38:31.928228+00:00 Debian Importer Affected by VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:10:44.677289+00:00 Debian Oval Importer Fixing VCID-qg9t-d2pk-yub6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:41:17.453202+00:00 Debian Oval Importer Fixing VCID-um87-6yps-cbfk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:48:29.996636+00:00 Debian Oval Importer Affected by VCID-bn6y-snuj-gbdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-04T18:05:27.359752+00:00 Debian Importer Affected by VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.1.0