CVE-2026-28372

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*

History

07 Mar 2026, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/07/1 -
  • () http://www.openwall.com/lists/oss-security/2026/03/07/2 -

06 Mar 2026, 18:16

Type Values Removed Values Added
Summary
  • (es) telnetd en GNU inetutils hasta la versión 2.7 permite la escalada de privilegios que puede ser explotada al abusar del soporte de credenciales de servicio de systemd añadido a la implementación de login(1) de util-linux en la versión 2.40. Esto está relacionado con el control del cliente sobre la variable de entorno CREDENTIALS_DIRECTORY, y requiere que un usuario local sin privilegios cree un archivo login.noauth.
References
  • () http://www.openwall.com/lists/oss-security/2026/03/06/2 -
  • () http://www.openwall.com/lists/oss-security/2026/03/06/3 -
References () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html - Mailing List, Third Party Advisory, Exploit () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html - Exploit, Mailing List, Third Party Advisory

02 Mar 2026, 15:12

Type Values Removed Values Added
CPE cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*
First Time Gnu
Gnu inetutils
References () https://git.hadrons.org/cgit/debian/pkgs/inetutils.git/commit/?id=3953943d8296310485f98963883a798545ab9a6c - () https://git.hadrons.org/cgit/debian/pkgs/inetutils.git/commit/?id=3953943d8296310485f98963883a798545ab9a6c - Patch
References () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html - () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html - Mailing List, Third Party Advisory, Exploit
References () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00012.html - () https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00012.html - Mailing List, Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2026/02/24/1 - () https://www.openwall.com/lists/oss-security/2026/02/24/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2026/02/27/3 - () http://www.openwall.com/lists/oss-security/2026/02/27/3 - Mailing List, Third Party Advisory

27 Feb 2026, 19:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/02/27/3 -

27 Feb 2026, 06:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 06:18

Updated : 2026-03-07 17:15


NVD link : CVE-2026-28372

Mitre link : CVE-2026-28372

CVE.ORG link : CVE-2026-28372


JSON object : View

Products Affected

gnu

  • inetutils
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere