dropbear: backport upstream fix for CVE-2018-15599
authorHans Dedecker <dedeckeh@gmail.com>
Fri, 24 Aug 2018 13:02:24 +0000 (15:02 +0200)
committerJo-Philipp Wich <jo@mein.io>
Tue, 18 Dec 2018 10:28:11 +0000 (11:28 +0100)
CVE description :
The recv_msg_userauth_request function in svr-auth.c in Dropbear through
2018.76 is prone to a user enumeration vulnerability because username
validity affects how fields in SSH_MSG_USERAUTH messages are handled,
a similar issue to CVE-2018-15473 in an unrelated codebase.

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
(backported from 2211ee0037764e1c6b1576fe7a0975722cd4acdc)

package/network/services/dropbear/Makefile

index 742e538ff55668d059f5d4d9f88e647df09e12ec..182552f6ea41f743ec2b102d1f1c3e32b2445f94 100644 (file)
@@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
 
 PKG_NAME:=dropbear
 PKG_VERSION:=2017.75
-PKG_RELEASE:=6
+PKG_RELEASE:=7
 
 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.bz2
 PKG_SOURCE_URL:= \