Commit eed0e2e4 authored by Matt Johnston's avatar Matt Johnston

add CVEs and patch urls

parent bda3bc4c
...@@ -9,16 +9,24 @@ ...@@ -9,16 +9,24 @@
A dbclient user who can control username or host arguments could potentially A dbclient user who can control username or host arguments could potentially
run arbitrary code as the dbclient user. This could be a problem if scripts run arbitrary code as the dbclient user. This could be a problem if scripts
or webpages pass untrusted input to the dbclient program. or webpages pass untrusted input to the dbclient program.
CVE-2016-7406
https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
- Security: dropbearconvert import of OpenSSH keys could run arbitrary code as - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as
the local dropbearconvert user when parsing malicious key files the local dropbearconvert user when parsing malicious key files
CVE-2016-7407
https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
- Security: dbclient could run arbitrary code as the local dbclient user if - Security: dbclient could run arbitrary code as the local dbclient user if
particular -m or -c arguments are provided. This could be an issue where particular -m or -c arguments are provided. This could be an issue where
dbclient is used in scripts. dbclient is used in scripts.
CVE-2016-7408
https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
- Security: dbclient or dropbear server could expose process memory to the - Security: dbclient or dropbear server could expose process memory to the
running user if compiled with DEBUG_TRACE and running with -v running user if compiled with DEBUG_TRACE and running with -v
CVE-2016-7409
https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
The security issues were reported by an anonymous researcher working with The security issues were reported by an anonymous researcher working with
Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html
...@@ -64,6 +72,7 @@ ...@@ -64,6 +72,7 @@
- Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions, - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions,
found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116 found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116
https://secure.ucc.asn.au/hg/dropbear/rev/a3e8389e01ff
2015.71 - 3 December 2015 2015.71 - 3 December 2015
...@@ -342,9 +351,11 @@ kernels, from Steve Dover ...@@ -342,9 +351,11 @@ kernels, from Steve Dover
- Limit the size of decompressed payloads, avoids memory exhaustion denial - Limit the size of decompressed payloads, avoids memory exhaustion denial
of service of service
Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421 Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421
https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f
- Avoid disclosing existence of valid users through inconsistent delays - Avoid disclosing existence of valid users through inconsistent delays
Thanks to Logan Lamb for reporting. CVE-2013-4434 Thanks to Logan Lamb for reporting. CVE-2013-4434
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a
- Update config.guess and config.sub for newer architectures - Update config.guess and config.sub for newer architectures
...@@ -447,6 +458,7 @@ though probably will be soon ...@@ -447,6 +458,7 @@ though probably will be soon
This bug affects releases 0.52 onwards. Ref CVE-2012-0920. This bug affects releases 0.52 onwards. Ref CVE-2012-0920.
Thanks to Danny Fullerton of Mantor Organization for reporting Thanks to Danny Fullerton of Mantor Organization for reporting
the bug. the bug.
https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
- Compile fix, only apply IPV6 socket options if they are available in headers - Compile fix, only apply IPV6 socket options if they are available in headers
Thanks to Gustavo Zacarias for the patch Thanks to Gustavo Zacarias for the patch
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment