Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
Matt Johnston
dropbear
Commits
253cd3b6
Commit
253cd3b6
authored
Oct 16, 2013
by
Matt Johnston
Browse files
- 2013.60, update CHANGES
- Add CVE references to CHANGES
parent
920120d0
Changes
2
Hide whitespace changes
Inline
Side-by-side
CHANGES
View file @
253cd3b6
2013.60 - Wednesday 16 October 2013
- Fix "make install" so that it doesn't always install to /bin and /sbin
- Fix "make install MULTI=1", installing manpages failed
- Fix "make install" when scp is included since it has no manpage
- Make --disable-bundled-libtom work
2013.59 - Friday 4 October 2013
2013.59 - Friday 4 October 2013
- Fix crash from -J command
- Fix crash from -J command
...
@@ -14,10 +24,10 @@
...
@@ -14,10 +24,10 @@
- Limit the size of decompressed payloads, avoids memory exhaustion denial
- Limit the size of decompressed payloads, avoids memory exhaustion denial
of service
of service
Thanks to Logan Lamb for reporting and investigating it
Thanks to Logan Lamb for reporting and investigating it
. CVE-2013-4421
- Avoid disclosing existence of valid users through inconsistent delays
- Avoid disclosing existence of valid users through inconsistent delays
Thanks to Logan Lamb for reporting
Thanks to Logan Lamb for reporting
. CVE-2013-4434
- Update config.guess and config.sub for newer architectures
- Update config.guess and config.sub for newer architectures
...
@@ -318,7 +328,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
...
@@ -318,7 +328,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
- Security: dbclient previously would prompt to confirm a
- Security: dbclient previously would prompt to confirm a
mismatching hostkey but wouldn't warn loudly. It will now
mismatching hostkey but wouldn't warn loudly. It will now
exit upon a mismatch.
exit upon a mismatch.
CVE-2007-1099
- Compile fixes, make sure that all variable definitions are at the start
- Compile fixes, make sure that all variable definitions are at the start
of a scope.
of a scope.
...
@@ -380,7 +390,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
...
@@ -380,7 +390,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
(thanks to Tomas Vanek for helping track it down)
(thanks to Tomas Vanek for helping track it down)
- Implement per-IP pre-authentication connection limits
- Implement per-IP pre-authentication connection limits
(after some poking from Pablo Fernandez)
(after some poking from Pablo Fernandez)
CVE-2006-1206
- Exit gracefully if trying to connect to as SSH v1 server
- Exit gracefully if trying to connect to as SSH v1 server
(reported by Rushi Lala)
(reported by Rushi Lala)
...
@@ -401,7 +411,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
...
@@ -401,7 +411,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
- SECURITY: fix for buffer allocation error in server code, could potentially
- SECURITY: fix for buffer allocation error in server code, could potentially
allow authenticated users to gain elevated privileges. All multi-user systems
allow authenticated users to gain elevated privileges. All multi-user systems
running the server should upgrade (or apply the patch available on the
running the server should upgrade (or apply the patch available on the
Dropbear webpage).
Dropbear webpage).
CVE-2005-4178
- Fix channel handling code so that redirecting to /dev/null doesn't use
- Fix channel handling code so that redirecting to /dev/null doesn't use
100% CPU.
100% CPU.
...
@@ -608,7 +618,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
...
@@ -608,7 +618,7 @@ https://secure.ucc.asn.au/hg/dropbear/graph/default
- SECURITY: Don't try to free() uninitialised variables in DSS verification
- SECURITY: Don't try to free() uninitialised variables in DSS verification
code. Thanks to Arne Bernin for pointing out this bug. This is possibly
code. Thanks to Arne Bernin for pointing out this bug. This is possibly
exploitable, all users with DSS and pubkey-auth compiled in are advised to
exploitable, all users with DSS and pubkey-auth compiled in are advised to
upgrade.
upgrade.
CVE-2004-2486
- Clean up agent forwarding socket files correctly, patch from Gerrit Pape.
- Clean up agent forwarding socket files correctly, patch from Gerrit Pape.
...
...
sysoptions.h
View file @
253cd3b6
...
@@ -4,7 +4,7 @@
...
@@ -4,7 +4,7 @@
*******************************************************************/
*******************************************************************/
#ifndef DROPBEAR_VERSION
#ifndef DROPBEAR_VERSION
#define DROPBEAR_VERSION "2013.
59
"
#define DROPBEAR_VERSION "2013.
60
"
#endif
#endif
#define LOCAL_IDENT "SSH-2.0-dropbear_" DROPBEAR_VERSION
#define LOCAL_IDENT "SSH-2.0-dropbear_" DROPBEAR_VERSION
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment