Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/inetutils@2:2.6-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/inetutils@2:2.6-3%2Bdeb13u2?distro=trixie
Next non-vulnerable version 2:2.6-3+deb13u3
Latest non-vulnerable version 2:2.7-5
Risk 4.4
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-hm61-cd18-hycu
Aliases:
CVE-2026-32746
telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
2:2.7-4
Affected by 0 other vulnerabilities.
2:2.7-5
Affected by 0 other vulnerabilities.
VCID-wfv6-euzm-7bhc
Aliases:
CVE-2026-32772
telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.
2:2.6-3+deb13u3
Affected by 0 other vulnerabilities.
2:2.7-5
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-6xfm-qpgd-ebaw telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file. CVE-2026-28372
VCID-8491-mjp3-bqbv krb5-appl: NULL pointer dereference CVE-2022-39028
VCID-8mwn-2k1d-rkfz Multiple vulnerabilities have been found in RSYSLOG, allowing attackers to cause Denial of Service. CVE-2014-3634
VCID-bn6y-snuj-gbdy A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root. CVE-2026-24061
VCID-eq37-ztb2-nfb8 The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl. CVE-2021-40491
VCID-hm61-cd18-hycu telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full. CVE-2026-32746
VCID-jw1r-x7s2-tkdj Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function. CVE-2004-1485
VCID-m459-kwuf-2kd4 GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process. CVE-2023-40303
VCID-nes3-sr2e-yueb This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2011. The worst of these vulnerabilities could lead to local privilege escalation and remote code execution. Please see the package list and CVE identifiers below for more information. CVE-2010-2529
VCID-qg9t-d2pk-yub6 Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. CVE-2019-0053
VCID-um87-6yps-cbfk telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code CVE-2020-10188
VCID-unvx-tsxw-abbw A boundary error in Heimdal could result in execution of arbitrary code. CVE-2011-4862
VCID-wfv6-euzm-7bhc telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR. CVE-2026-32772

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:10:36.982624+00:00 Debian Importer Fixing VCID-m459-kwuf-2kd4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:42:16.836761+00:00 Debian Importer Fixing VCID-unvx-tsxw-abbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:19:20.286403+00:00 Debian Importer Fixing VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:12:45.299691+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:47:09.914988+00:00 Debian Importer Fixing VCID-nes3-sr2e-yueb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:31.670439+00:00 Debian Importer Fixing VCID-8491-mjp3-bqbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:25.088681+00:00 Debian Importer Fixing VCID-qg9t-d2pk-yub6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:34.664955+00:00 Debian Importer Fixing VCID-8mwn-2k1d-rkfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:48.049106+00:00 Debian Importer Fixing VCID-bn6y-snuj-gbdy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:05:05.534889+00:00 Debian Importer Fixing VCID-eq37-ztb2-nfb8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:48:41.565823+00:00 Debian Importer Fixing VCID-um87-6yps-cbfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:56.343048+00:00 Debian Importer Fixing VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:31.255753+00:00 Debian Importer Fixing VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:03:58.600445+00:00 Debian Importer Fixing VCID-m459-kwuf-2kd4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:33.254131+00:00 Debian Importer Fixing VCID-unvx-tsxw-abbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:12.816091+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:02:16.441078+00:00 Debian Importer Fixing VCID-nes3-sr2e-yueb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:29.187604+00:00 Debian Importer Fixing VCID-8491-mjp3-bqbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:03.763456+00:00 Debian Importer Fixing VCID-qg9t-d2pk-yub6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:54.377772+00:00 Debian Importer Fixing VCID-8mwn-2k1d-rkfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:46:03.777066+00:00 Debian Importer Fixing VCID-eq37-ztb2-nfb8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:21.382550+00:00 Debian Importer Fixing VCID-um87-6yps-cbfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:49:25.676549+00:00 Debian Importer Fixing VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:49:25.603339+00:00 Debian Importer Fixing VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:49:25.529360+00:00 Debian Importer Fixing VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:49:25.454475+00:00 Debian Importer Fixing VCID-bn6y-snuj-gbdy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-06T02:47:47.301610+00:00 Debian Importer Fixing VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-06T02:47:47.241058+00:00 Debian Importer Fixing VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:31.013762+00:00 Debian Importer Affected by VCID-wfv6-euzm-7bhc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.967043+00:00 Debian Importer Affected by VCID-hm61-cd18-hycu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.941287+00:00 Debian Importer Fixing VCID-6xfm-qpgd-ebaw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.882930+00:00 Debian Importer Fixing VCID-bn6y-snuj-gbdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.814854+00:00 Debian Importer Fixing VCID-m459-kwuf-2kd4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.765209+00:00 Debian Importer Fixing VCID-8491-mjp3-bqbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.716379+00:00 Debian Importer Fixing VCID-eq37-ztb2-nfb8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.657419+00:00 Debian Importer Fixing VCID-um87-6yps-cbfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.606952+00:00 Debian Importer Fixing VCID-qg9t-d2pk-yub6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.557706+00:00 Debian Importer Fixing VCID-8mwn-2k1d-rkfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.509969+00:00 Debian Importer Fixing VCID-unvx-tsxw-abbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.469089+00:00 Debian Importer Fixing VCID-nes3-sr2e-yueb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:30.427153+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.1.0