Commit 81a02404 authored by Matt Johnston's avatar Matt Johnston
Browse files

add CVEs and patch urls

parent b4d31b49
...@@ -9,16 +9,24 @@ ...@@ -9,16 +9,24 @@
A dbclient user who can control username or host arguments could potentially A dbclient user who can control username or host arguments could potentially
run arbitrary code as the dbclient user. This could be a problem if scripts run arbitrary code as the dbclient user. This could be a problem if scripts
or webpages pass untrusted input to the dbclient program. or webpages pass untrusted input to the dbclient program.
CVE-2016-7406
https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
- Security: dropbearconvert import of OpenSSH keys could run arbitrary code as - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as
the local dropbearconvert user when parsing malicious key files the local dropbearconvert user when parsing malicious key files
CVE-2016-7407
https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
- Security: dbclient could run arbitrary code as the local dbclient user if - Security: dbclient could run arbitrary code as the local dbclient user if
particular -m or -c arguments are provided. This could be an issue where particular -m or -c arguments are provided. This could be an issue where
dbclient is used in scripts. dbclient is used in scripts.
CVE-2016-7408
https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
- Security: dbclient or dropbear server could expose process memory to the - Security: dbclient or dropbear server could expose process memory to the
running user if compiled with DEBUG_TRACE and running with -v running user if compiled with DEBUG_TRACE and running with -v
CVE-2016-7409
https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
The security issues were reported by an anonymous researcher working with The security issues were reported by an anonymous researcher working with
Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html
...@@ -64,6 +72,7 @@ ...@@ -64,6 +72,7 @@
- Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions, - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions,
found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116 found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116
https://secure.ucc.asn.au/hg/dropbear/rev/a3e8389e01ff
2015.71 - 3 December 2015 2015.71 - 3 December 2015
...@@ -342,9 +351,11 @@ kernels, from Steve Dover ...@@ -342,9 +351,11 @@ kernels, from Steve Dover
- Limit the size of decompressed payloads, avoids memory exhaustion denial - Limit the size of decompressed payloads, avoids memory exhaustion denial
of service of service
Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421 Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421
https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f
- Avoid disclosing existence of valid users through inconsistent delays - Avoid disclosing existence of valid users through inconsistent delays
Thanks to Logan Lamb for reporting. CVE-2013-4434 Thanks to Logan Lamb for reporting. CVE-2013-4434
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a
- Update config.guess and config.sub for newer architectures - Update config.guess and config.sub for newer architectures
...@@ -447,6 +458,7 @@ though probably will be soon ...@@ -447,6 +458,7 @@ though probably will be soon
This bug affects releases 0.52 onwards. Ref CVE-2012-0920. This bug affects releases 0.52 onwards. Ref CVE-2012-0920.
Thanks to Danny Fullerton of Mantor Organization for reporting Thanks to Danny Fullerton of Mantor Organization for reporting
the bug. the bug.
https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
- Compile fix, only apply IPV6 socket options if they are available in headers - Compile fix, only apply IPV6 socket options if they are available in headers
Thanks to Gustavo Zacarias for the patch Thanks to Gustavo Zacarias for the patch
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment