Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/tftp-hpa@5.2%2B20240610-3?distro=trixie
purl pkg:deb/debian/tftp-hpa@5.2%2B20240610-3?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-jw1r-x7s2-tkdj Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function. CVE-2004-1485
VCID-z858-mjyw-4yhq A vulnerability was found in tftp-hpa, which leads to remote execution of arbitrary code. CVE-2011-2199

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:55:37.783341+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:15.152878+00:00 Debian Importer Fixing VCID-z858-mjyw-4yhq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:52:36.450717+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:59.481467+00:00 Debian Importer Fixing VCID-z858-mjyw-4yhq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:54:17.523193+00:00 Debian Importer Fixing VCID-z858-mjyw-4yhq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:54:17.481305+00:00 Debian Importer Fixing VCID-jw1r-x7s2-tkdj https://security-tracker.debian.org/tracker/data/json 38.1.0