A patched Arch Linux PKGBUILD to address CVE-2019-0053 (buffer overflow). Downloads and applies a (currently) unreleased patch from upstream.inetutils hasn't been updated in 5 years, and neither has the official Arch package. A patch has been released that addresses CVE-2019-0053 (buffer overflow exploit from the use of sprintf instead of snprintf), but there's no official release in sight.
Honestly, there's a lot more wrong with using telnet than just buffer exploits, but this was a high urgency issue that took 10 minutes to address. Waiting on a response from the official maintainers right now, but this repo will do for the meantime.
[4.0K] /data/pocs/673d8f6e251c7c799b81cf471b9548401a480f54
├── [5.1K] 0001-telnetd-Fix-buffer-overflows.patch
├── [2.6K] 0037-telnet-Validate-supplied-environment-variables.-CVE-.patch
├── [ 371] inetutils.install
├── [ 15K] PKGBUILD
├── [ 504] README.md
└── [ 127] telnetd.pam
0 directories, 6 files