Debian Package Tracker
Register | Log in
Subscribe

netkit-rsh

Choose email to subscribe with

general
  • source: netkit-rsh (main)
  • version: 0.17-24
  • maintainer: Debian QA Group (DMD)
  • arch: any
  • std-ver: 4.2.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.17-20
  • oldstable: 0.17-22
  • stable: 0.17-24
versioned links
  • 0.17-20: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.17-22: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.17-24: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • rsh-client
  • rsh-server (2 bugs: 0, 2, 0, 0)
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2023-38336: netkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778.
Created: 2023-07-15 Last update: 2024-02-01 00:10
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2023-38336: netkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778.
Created: 2023-07-15 Last update: 2023-07-31 03:00
No known security issue in bookworm wishlist

There is 1 open security issue in bookworm.

1 ignored issue:
  • CVE-2023-38336: netkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778.
Created: 2023-07-15 Last update: 2025-02-27 05:02
news
[rss feed]
  • [2024-02-01] netkit-rsh REMOVED from testing (Debian testing watch)
  • [2024-01-31] Removed 0.17-24 from unstable (Debian FTP Masters)
  • [2023-01-27] netkit-rsh 0.17-24 MIGRATED to testing (Debian testing watch)
  • [2023-01-21] Accepted netkit-rsh 0.17-24 (source) into unstable (Holger Levsen)
  • [2022-09-29] netkit-rsh 0.17-23 MIGRATED to testing (Debian testing watch)
  • [2022-09-24] Accepted netkit-rsh 0.17-23 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2021-11-18] Accepted netkit-rsh 0.17-17+deb9u1 (source amd64) into oldoldstable (Thorsten Alteholz)
  • [2020-09-13] netkit-rsh 0.17-22 MIGRATED to testing (Debian testing watch)
  • [2020-09-08] Accepted netkit-rsh 0.17-22 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2019-10-19] netkit-rsh 0.17-21 MIGRATED to testing (Debian testing watch)
  • [2019-10-14] Accepted netkit-rsh 0.17-21 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2019-02-05] netkit-rsh 0.17-20 MIGRATED to testing (Debian testing watch)
  • [2019-01-30] Accepted netkit-rsh 0.17-20 (source amd64) into unstable (Alberto Gonzalez Iniesta)
  • [2018-12-29] netkit-rsh 0.17-19 MIGRATED to testing (Debian testing watch)
  • [2018-12-24] Accepted netkit-rsh 0.17-19 (source amd64) into unstable (Alberto Gonzalez Iniesta)
  • [2018-03-16] netkit-rsh 0.17-18 MIGRATED to testing (Debian testing watch)
  • [2018-03-10] Accepted netkit-rsh 0.17-18 (source amd64) into unstable (Alberto Gonzalez Iniesta)
  • [2016-11-02] netkit-rsh 0.17-17 MIGRATED to testing (Debian testing watch)
  • [2016-10-27] Accepted netkit-rsh 0.17-17 (source amd64) into unstable (Alberto Gonzalez Iniesta)
  • [2016-09-10] netkit-rsh 0.17-16 MIGRATED to testing (Debian testing watch)
  • [2016-09-04] Accepted netkit-rsh 0.17-16 (source amd64) into unstable (Alberto Gonzalez Iniesta)
  • [2010-06-30] netkit-rsh 0.17-15 MIGRATED to testing (Debian testing watch)
  • [2010-06-19] Accepted netkit-rsh 0.17-15 (source i386) (Alberto Gonzalez Iniesta)
  • [2007-08-27] netkit-rsh 0.17-14 MIGRATED to testing (Debian testing watch)
  • [2007-08-16] Accepted netkit-rsh 0.17-14 (source i386) (Alberto Gonzalez Iniesta)
  • [2004-11-08] Accepted netkit-rsh 0.17-13 (i386 source) (Alberto Gonzalez Iniesta)
  • [2004-05-19] Accepted netkit-rsh 0.17-12 (i386 source) (Alberto Gonzalez Iniesta)
  • [2003-11-19] Accepted netkit-rsh 0.17-11 (i386 source) (Herbert Xu)
  • [2003-09-19] Accepted netkit-rsh 0.17-10 (i386 source) (Herbert Xu)
  • [2003-09-13] Accepted netkit-rsh 0.17-9 (i386 source) (Herbert Xu)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing