dropbear: backport upstream fix for CVE-2018-15599
authorHans Dedecker <dedeckeh@gmail.com>
Fri, 24 Aug 2018 13:02:24 +0000 (15:02 +0200)
committerHauke Mehrtens <hauke@hauke-m.de>
Mon, 27 Aug 2018 12:14:57 +0000 (14:14 +0200)
commitbb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6
treee80e7a1a46bf4ba3d19d463245075205599447df
parent8a72a868fd8000b826d5337fc413a51b01f39b5d
dropbear: backport upstream fix for CVE-2018-15599

CVE description :
The recv_msg_userauth_request function in svr-auth.c in Dropbear through
2018.76 is prone to a user enumeration vulnerability because username
validity affects how fields in SSH_MSG_USERAUTH messages are handled,
a similar issue to CVE-2018-15473 in an unrelated codebase.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
package/network/services/dropbear/Makefile
package/network/services/dropbear/patches/020-Wait-to-fail-invalid-usernames.patch [new file with mode: 0644]
package/network/services/dropbear/patches/100-pubkey_path.patch