Debian Package Tracker
Register | Log in
Subscribe

inetutils

Choose email to subscribe with

general
  • source: inetutils (main)
  • version: 2:2.0-1
  • maintainer: Guillem Jover (DMD)
  • arch: any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2:1.9.2.39.3a460-3
  • o-o-sec: 2:1.9.2.39.3a460-3+deb8u1
  • oldstable: 2:1.9.4-2
  • old-sec: 2:1.9.4-2+deb9u1
  • stable: 2:1.9.4-7+deb10u1
  • testing: 2:2.0-1
  • unstable: 2:2.0-1
versioned links
  • 2:1.9.2.39.3a460-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.2.39.3a460-3+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.4-2+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.4-7+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • inetutils-ftp
  • inetutils-ftpd
  • inetutils-inetd
  • inetutils-ping (2 bugs: 0, 0, 2, 0)
  • inetutils-syslogd (3 bugs: 0, 3, 0, 0)
  • inetutils-talk
  • inetutils-talkd (1 bugs: 0, 1, 0, 0)
  • inetutils-telnet (2 bugs: 0, 0, 2, 0)
  • inetutils-telnetd
  • inetutils-tools (1 bugs: 0, 1, 0, 0)
  • inetutils-traceroute
action needed
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2020-10-19 Last update: 2021-03-01 11:01
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2017-11-06 Last update: 2019-08-15 17:47
No known security issue in stretch wishlist

There is 1 open security issue in stretch.

1 ignored issue:
  • CVE-2019-0053: Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
Created: 2021-02-19 Last update: 2021-02-25 09:13
No known security issue in buster wishlist

There is 1 open security issue in buster.

1 ignored issue:
  • CVE-2019-0053: Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
Created: 2021-02-19 Last update: 2021-02-25 09:13
news
[rss feed]
  • [2021-02-08] inetutils 2:2.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-02-05] Accepted inetutils 2:2.0-1 (source) into unstable (Guillem Jover)
  • [2021-02-01] inetutils 2:1.9.4.91-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-30] Accepted inetutils 2:1.9.4.91-1 (source) into unstable (Guillem Jover)
  • [2021-01-29] inetutils 2:1.9.4.90-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-27] Accepted inetutils 2:1.9.4.90-1 (source) into unstable (Guillem Jover)
  • [2020-12-29] inetutils 2:1.9.4-13 MIGRATED to testing (Debian testing watch)
  • [2020-12-25] Accepted inetutils 2:1.9.4-13 (source) into unstable (Guillem Jover)
  • [2020-09-20] Accepted inetutils 2:1.9.4-7+deb10u1 (source amd64) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2020-08-24] Accepted inetutils 2:1.9.4-2+deb9u1 (source) into oldstable (Adrian Bunk)
  • [2020-04-17] inetutils 2:1.9.4-12 MIGRATED to testing (Debian testing watch)
  • [2020-04-15] Accepted inetutils 2:1.9.2.39.3a460-3+deb8u1 (source amd64) into oldoldstable (Roberto C. Sanchez)
  • [2020-04-14] Accepted inetutils 2:1.9.4-12 (source) into unstable (Guillem Jover)
  • [2020-01-28] inetutils 2:1.9.4-11 MIGRATED to testing (Debian testing watch)
  • [2020-01-26] Accepted inetutils 2:1.9.4-11 (source) into unstable (Guillem Jover)
  • [2019-08-18] inetutils 2:1.9.4-10 MIGRATED to testing (Debian testing watch)
  • [2019-08-16] Accepted inetutils 2:1.9.4-10 (source) into unstable (Guillem Jover)
  • [2019-08-15] Accepted inetutils 2:1.9.4-9 (source) into unstable (Guillem Jover)
  • [2019-07-23] inetutils 2:1.9.4-8 MIGRATED to testing (Debian testing watch)
  • [2019-07-13] Accepted inetutils 2:1.9.4-8 (source) into unstable (Guillem Jover)
  • [2019-02-27] inetutils 2:1.9.4-7 MIGRATED to testing (Debian testing watch)
  • [2019-02-16] Accepted inetutils 2:1.9.4-7 (source) into unstable (Guillem Jover)
  • [2019-02-10] Accepted inetutils 2:1.9.4-6 (source) into unstable (Guillem Jover)
  • [2018-10-08] inetutils 2:1.9.4-5 MIGRATED to testing (Debian testing watch)
  • [2018-10-02] Accepted inetutils 2:1.9.4-5 (source) into unstable (Guillem Jover)
  • [2018-09-28] Accepted inetutils 2:1.9.4-4 (source) into unstable (Guillem Jover)
  • [2017-11-11] inetutils 2:1.9.4-3 MIGRATED to testing (Debian testing watch)
  • [2017-11-05] Accepted inetutils 2:1.9.4-3 (source) into unstable (Guillem Jover)
  • [2016-06-16] inetutils 2:1.9.4-2 MIGRATED to testing (Debian testing watch)
  • [2016-06-05] Accepted inetutils 2:1.9.4-2 (source) into unstable (Guillem Jover)
  • 1
  • 2
bugs [bug history graph]
  • all: 12
  • RC: 0
  • I&N: 6
  • M&W: 6
  • F&P: 0
  • patch: 1
links
  • homepage
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2:2.0-1
  • 11 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing