CVE-2022-39028

NameCVE-2022-39028
Descriptiontelnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3205-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
inetutils (PTS)buster2:1.9.4-7+deb10u1vulnerable
buster (security)2:1.9.4-7+deb10u3fixed
bullseye2:2.0-1+deb11u2fixed
bookworm2:2.4-2+deb12u1fixed
sid, trixie2:2.5-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
inetutilssourcebuster2:1.9.4-7+deb10u2DLA-3205-1
inetutilssourcebullseye2:2.0-1+deb11u1
inetutilssource(unstable)2:2.3-5

Notes

https://lists.gnu.org/archive/html/bug-inetutils/2022-08/msg00002.html
https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html

Search for package or bug name: Reporting problems