DEBIAN-CVE-2026-28372

Source
https://security-tracker.debian.org/tracker/CVE-2026-28372
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28372.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-28372
Upstream
Downstream
Published
2026-02-27T06:18:00.077Z
Modified
2026-03-09T01:26:36.505546Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth file.

References

Affected packages

Debian:11 / inetutils

Package

Name
inetutils
Purl
pkg:deb/debian/inetutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.0-1
2:2.0-1+deb11u1
2:2.0-1+deb11u2
2:2.0-1+deb11u3
2:2.1-1
2:2.1-2
2:2.2-1
2:2.2-2
2:2.3-1
2:2.3-2
2:2.3-3
2:2.3-4
2:2.3-5
2:2.3-6
2:2.3-6+hurd.1
2:2.4-1
2:2.4-2
2:2.4-3
2:2.5-1
2:2.5-2
2:2.5-3
2:2.5-4
2:2.5-5
2:2.5-6
2:2.6-1
2:2.6-2
2:2.6-3
2:2.6-4
2:2.7-1
2:2.7-2
2:2.7-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28372.json"

Debian:12 / inetutils

Package

Name
inetutils
Purl
pkg:deb/debian/inetutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:2.*
2:2.4-2
2:2.4-2+deb12u1
2:2.4-2+deb12u2
2:2.4-3
2:2.5-1
2:2.5-2
2:2.5-3
2:2.5-4
2:2.5-5
2:2.5-6
2:2.6-1
2:2.6-2
2:2.6-3
2:2.6-4
2:2.7-1
2:2.7-2
2:2.7-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28372.json"

Debian:13 / inetutils

Package

Name
inetutils
Purl
pkg:deb/debian/inetutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.6-3+deb13u2

Affected versions

2:2.*
2:2.6-3
2:2.6-3+deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28372.json"

Debian:14 / inetutils

Package

Name
inetutils
Purl
pkg:deb/debian/inetutils?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.7-3

Affected versions

2:2.*
2:2.6-3
2:2.6-4
2:2.7-1
2:2.7-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28372.json"