GNU Inetutils telnetd Security Update Advisory (CVE-2026-32746)

GNU Inetutils telnetd Security Update Advisory (CVE-2026-32746)

overview

A vulnerability in GNU Inetutils telnetd has been disclosed. users of affected products are advised to update to the latest version when security patches become available.

affected Products

CVE-2026-32746

GNU Inetutils version: 2.7 and earlier

disclosed vulnerabilities

Buffer overflow vulnerability in GNU Inetutils telnetd (CVE-2026-32746)

what to do before applying the patch

CVE-2026-32746

  • disable telnetd service if possible
  • Immediately block external access to TCP/23 ports
  • check externally exposed Telnet services for GNU Inetutils usage
  • prioritize quarantine for systems that are directly exposed to the Internet or have inadequate network isolation

references

[1] Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://www.openwall.com/lists/oss-security/2026/03/12/4
[2] Re: Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://www.openwall.com/lists/oss-security/2026/03/14/1
[3] Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html