Debian Package Tracker
Register | Log in
Subscribe

inetutils

Choose email to subscribe with

general
  • source: inetutils (main)
  • version: 2:2.2-2
  • maintainer: Guillem Jover (DMD)
  • arch: any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2:1.9.4-2
  • o-o-sec: 2:1.9.4-2+deb9u1
  • oldstable: 2:1.9.4-7+deb10u1
  • stable: 2:2.0-1
  • testing: 2:2.2-2
  • unstable: 2:2.2-2
versioned links
  • 2:1.9.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.4-2+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:1.9.4-7+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2:2.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • inetutils-ftp
  • inetutils-ftpd
  • inetutils-inetd
  • inetutils-ping (2 bugs: 0, 0, 2, 0)
  • inetutils-syslogd (3 bugs: 0, 3, 0, 0)
  • inetutils-talk
  • inetutils-talkd (1 bugs: 0, 1, 0, 0)
  • inetutils-telnet (3 bugs: 0, 0, 3, 0)
  • inetutils-telnetd
  • inetutils-tools (1 bugs: 0, 1, 0, 0)
  • inetutils-traceroute
action needed
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2021-08-14 Last update: 2022-05-28 07:01
lintian reports 10 warnings normal
Lintian reports 10 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-01-01 Last update: 2022-01-01 04:32
2 low-priority security issues in buster low

There are 2 open security issues in buster.

1 issue left for the package maintainer to handle:
  • CVE-2021-40491: (needs triaging) The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.

You can find information about how to handle this issue in the security team's documentation.

1 ignored issue:
  • CVE-2019-0053: Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from the CLI or shell — in Junos OS. Inbound telnet services are not affected by this issue. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S13; 12.3X48 versions prior to 12.3X48-D80; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D237, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S11, 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
Created: 2021-02-19 Last update: 2022-01-15 23:00
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-40491: (needs triaging) The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.

You can find information about how to handle this issue in the security team's documentation.

Created: 2021-09-02 Last update: 2022-01-15 23:00
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2017-11-06 Last update: 2019-08-15 17:47
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2021-09-07] inetutils 2:2.2-2 MIGRATED to testing (Debian testing watch)
  • [2021-09-05] Accepted inetutils 2:2.2-2 (source) into unstable (Guillem Jover)
  • [2021-09-04] inetutils 2:2.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-02] Accepted inetutils 2:2.2-1 (source) into unstable (Guillem Jover)
  • [2021-09-01] inetutils 2:2.1-2 MIGRATED to testing (Debian testing watch)
  • [2021-08-30] Accepted inetutils 2:2.1-2 (source) into unstable (Guillem Jover)
  • [2021-08-27] Accepted inetutils 2:2.1-1 (source) into unstable (Guillem Jover)
  • [2021-02-08] inetutils 2:2.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-02-05] Accepted inetutils 2:2.0-1 (source) into unstable (Guillem Jover)
  • [2021-02-01] inetutils 2:1.9.4.91-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-30] Accepted inetutils 2:1.9.4.91-1 (source) into unstable (Guillem Jover)
  • [2021-01-29] inetutils 2:1.9.4.90-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-27] Accepted inetutils 2:1.9.4.90-1 (source) into unstable (Guillem Jover)
  • [2020-12-29] inetutils 2:1.9.4-13 MIGRATED to testing (Debian testing watch)
  • [2020-12-25] Accepted inetutils 2:1.9.4-13 (source) into unstable (Guillem Jover)
  • [2020-09-20] Accepted inetutils 2:1.9.4-7+deb10u1 (source amd64) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2020-08-24] Accepted inetutils 2:1.9.4-2+deb9u1 (source) into oldstable (Adrian Bunk)
  • [2020-04-17] inetutils 2:1.9.4-12 MIGRATED to testing (Debian testing watch)
  • [2020-04-15] Accepted inetutils 2:1.9.2.39.3a460-3+deb8u1 (source amd64) into oldoldstable (Roberto C. Sanchez)
  • [2020-04-14] Accepted inetutils 2:1.9.4-12 (source) into unstable (Guillem Jover)
  • [2020-01-28] inetutils 2:1.9.4-11 MIGRATED to testing (Debian testing watch)
  • [2020-01-26] Accepted inetutils 2:1.9.4-11 (source) into unstable (Guillem Jover)
  • [2019-08-18] inetutils 2:1.9.4-10 MIGRATED to testing (Debian testing watch)
  • [2019-08-16] Accepted inetutils 2:1.9.4-10 (source) into unstable (Guillem Jover)
  • [2019-08-15] Accepted inetutils 2:1.9.4-9 (source) into unstable (Guillem Jover)
  • [2019-07-23] inetutils 2:1.9.4-8 MIGRATED to testing (Debian testing watch)
  • [2019-07-13] Accepted inetutils 2:1.9.4-8 (source) into unstable (Guillem Jover)
  • [2019-02-27] inetutils 2:1.9.4-7 MIGRATED to testing (Debian testing watch)
  • [2019-02-16] Accepted inetutils 2:1.9.4-7 (source) into unstable (Guillem Jover)
  • [2019-02-10] Accepted inetutils 2:1.9.4-6 (source) into unstable (Guillem Jover)
  • 1
  • 2
bugs [bug history graph]
  • all: 12
  • RC: 0
  • I&N: 5
  • M&W: 7
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 10)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2:2.2-2
  • 12 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing