Hi,

On Sat, Mar 14, 2026 at 03:58:54PM +0100, Salvatore Bonaccorso wrote:
> 
> The following vulnerability was published for inetutils.
> 
> CVE-2026-32772[0]:
> | telnet in GNU inetutils through 2.7 allows servers to read arbitrary
> | environment variables from clients via NEW_ENVIRON SEND USERVAR.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2026-32772
>     https://www.cve.org/CVERecord?id=CVE-2026-32772
> [1] https://www.openwall.com/lists/oss-security/2026/03/13/1

To add a bit more information (I'm note sure if it should go to security
tracker, but definetely would help to be in the BTS), there are two
patches mentioned in the oss-security thread restricting the ENVVARS
leaked, one in telnet client from openbsd [1][2] and one in
netkit-telnet [3][4]. Though at the moment, no upstream patch has
surfaced.

Cheers,
Charles

[1] https://www.openwall.com/lists/oss-security/2026/03/13/2
[2] 
https://github.com/openbsd/src/commit/1a11dc7253488a97d6df686dae9230f78682e8df
[3] https://www.openwall.com/lists/oss-security/2026/03/14/2
[4] 
https://gitlab.com/redhat/centos-stream/rpms/telnet/-/blob/c9s/telnet-0.17-env.patch

Reply via email to