GNU Inetutils telnetd Security Update Advisory (CVE-2026-32746)
overview
A vulnerability in GNU Inetutils telnetd has been disclosed. users of affected products are advised to update to the latest version when security patches become available.
affected Products
CVE-2026-32746
GNU Inetutils version: 2.7 and earlier
disclosed vulnerabilities
Buffer overflow vulnerability in GNU Inetutils telnetd (CVE-2026-32746)
what to do before applying the patch
CVE-2026-32746
- disable telnetd service if possible
- Immediately block external access to TCP/23 ports
- check externally exposed Telnet services for GNU Inetutils usage
- prioritize quarantine for systems that are directly exposed to the Internet or have inadequate network isolation
references
[1] Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://www.openwall.com/lists/oss-security/2026/03/12/4
[2] Re: Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://www.openwall.com/lists/oss-security/2026/03/14/1
[3] Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html