Debian Patches

Status for inetutils/2:2.7-4

Patch Description Author Forwarded Bugs Origin Last update
upstream/0001-Fix-injection-bug-with-bogus-user-names.patch [PATCH 1/5] Fix injection bug with bogus user names
Problem reported by Kyu Neushwaistein.
* telnetd/utility.c (_var_short_name):
Ignore user names that start with '-' or contain shell metacharacters.
Paul Eggert <eggert@cs.ucla.edu> not-needed upstream, commit:d47ef23dbdc1fd45c1c989e5bf88911328daa3b2 2026-01-20
upstream/0002-telnetd-Sanitize-all-variable-expansions.patch [PATCH 2/5] telnetd: Sanitize all variable expansions
* telnetd/utility.c (sanitize): New function.
(_var_short_name): Use it for all variables.
Simon Josefsson <simon@josefsson.org> not-needed upstream, commit:ab2e0b1f37c0c011b2cf7d0fd5687b30631a1921 2026-01-20
upstream/0003-telnetd-don-t-allow-systemd-service-credentials.patch [PATCH 3/5] telnetd: don't allow systemd service credentials
The login(1) implementation of util-linux added support for
systemd service credentials in release 2.40. This allows to
bypass authentication by specifying a directory name in the
environment variable CREDENTIALS_DIRECTORY. If this directory
contains a file named 'login.noauth' with the content of 'yes',
login(1) skips authentication.

GNU Inetutils telnetd supports to set arbitrary environment
variables using the 'Environment' and 'New Environment'
Telnet options. This allows specifying a directory containing
'login.noauth'. A local user can create such a directory
and file, and, e.g., specify the user name 'root' to escalate
privileges.

This problem was reported by Ron Ben Yizhak in
<https://lists.gnu.org/archive/html/bug-inetutils/2026-02/msg00000.html>.

This commit clears CREDENTIALS_DIRECTORY from the environment
before executing login(1) to implement a simple fix that can
be backported easily.

* telnetd/pty.c: Clear CREDENTIALS_DIRECTORY from the environment
before executing 'login'.
Erik Auerswald <auerswal@unix-ag.uni-kl.de> not-needed upstream, commit:4db2f19f4caac03c7f4da6363c140bd70df31386 2026-02-15
upstream/0004-telnetd-add-the-new-accept-env-option.patch [PATCH 4/5] telnetd: add the new --accept-env option
This changes telnetd to ignore all environment options from clients
unless the variable was listed by an --accept-env option. This
mitigates the many ways to escalate privileges using environment
variables.

* NEWS.md: Mention the change.
* bootstrap.conf (gnulib_modules): Add hashcode-string1, hash-set, and
xset.
* doc/inetutils.texi (telnetd invocation): Mention the new option.
* telnetd/pty.c (scrub_env): Remove function.
(start_login): Remove call to scrub_env. Remove unsetenv call that is
no longer needed.
* telnetd/state.c (suboption): Check for the environment variable in
accept_env_set before making changes to the environment.
* telnetd/telnetd.c (accept_env_set): New variable.
(string_hashcode, string_equals): New function needed for
gl_set_create_empty.
(ACCEPT_ENV_OPTION): New definition.
(argp_options): Add the --accept-env option.
(parse_opt): Process the new option.
(telnetd_setup): Clear the environment before processing options.
* telnetd/telnetd.h: Include gl_hash_set.h, gl_xset.h, and
hashcode-string1.h.
(accept_env_set): New declaration.
Collin Funk <collin.funk1@gmail.com> not-needed upstream, commit:81d436d26d5497423e28841af91756e373446cf4 2026-03-05
upstream/0005-telnetd-fix-stack-buffer-overflow-processing-SLC-sub.patch [PATCH 5/5] telnetd: fix stack buffer overflow processing SLC suboption triplets

Previously a client could write past the end of an internal buffer using
an SLC suboption with many triplets using function octets greater than
18, possibly leading to remote code execution. Reported by Adiel Sol,
Arad Inbar, Erez Cohen, Nir Somech, Ben Grinberg, Daniel Lubel at DREAM
Security Research Team at:
<https://lists.gnu.org/r/bug-inetutils/2026-03/msg00031.html>.

* telnetd/slc.c (add_slc): Return early if writing the tuple would lead
us to writing past the end of the buffer.
Collin Funk <collin.funk1@gmail.com> not-needed upstream, commit:95751794e3da2eebd605238ddbff2232b68edb5f 2026-03-11
local/0001-build-Disable-GFDL-info-files-and-useless-man-pages.patch [PATCH 1/6] build: Disable GFDL info files and useless man pages
We do not install the info file due to GFDL, and because it would
require an inetutils-doc package. Nor the man pages from upstream
generated with help2man as they are problematic for cross-building
and contain no additional information to what is already available
via --help output.

Instead we ship our own proper man pages.

Not forwarded upstream due to GNU policies regarding man pages.
Guillem Jover <guillem@hadrons.org> not-needed vendor, Debian 2010-06-09
local/0002-build-Use-runstatedir-for-run-directory.patch [PATCH 2/6] build: Use runstatedir for /run directory Guillem Jover <guillem@hadrons.org> yes vendor, Debian 2021-09-05
local/0003-inetd-Change-protocol-semantics-in-inetd.conf.patch [PATCH 3/6] inetd: Change protocol semantics in inetd.conf
Readd parts of the original patch that got botched when applied
upstream.

* src/inetd.c (getconfigent) [IPV6]: Change default family to IPv4 for "tcp"
and "udp". Change "tcp6" and "udp6" to support IPv4 mapped addresses.
Guillem Jover <guillem@hadrons.org> yes vendor, Debian 2010-09-06
local/0004-Use-krb5_auth_con_getsendsubkey-instead-of-krb5_auth.patch [PATCH 4/6] Use krb5_auth_con_getsendsubkey() instead of krb5_auth_con_getlocalsubkey()

The latter is not exposed in the headers anymore.
Guillem Jover <guillem@hadrons.org> yes vendor, Debian 2022-08-10
local/0005-inetd-Add-new-foreground-option.patch [PATCH 5/6] inetd: Add new --foreground option
This option avoids daemonizing, like --debug, except that it does not
imply debugging output. To be used primary by the systemd service.
Guillem Jover <guillem@hadrons.org> yes vendor, Debian 2023-08-08
local/0006-tests-Remove-bogus-test-for-unsorted-file-listing.patch [PATCH 6/6] tests: Remove bogus test for unsorted file listing
We cannot reliably test whether the -f option works against, because
that relies on the unsorted output coming out accidentally not sorted,
and this has been the cause for several indeterministic build failures
in various hosts (such as some sparc64 or reproducible build nodes).

This could be guaranteed with something like disorderfs, but we do not
bother and simply remove the test case.
Guillem Jover <guillem@hadrons.org> yes vendor, Debian 2025-06-20

All known versions for source package 'inetutils'

Links