diff options
author | Hans Dedecker <dedeckeh@gmail.com> | 2018-08-24 15:02:24 +0200 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2018-08-27 14:14:57 +0200 |
commit | bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6 (patch) | |
tree | e80e7a1a46bf4ba3d19d463245075205599447df /package/kernel/brcm2708-gpu-fw | |
parent | 8a72a868fd8000b826d5337fc413a51b01f39b5d (diff) | |
download | upstream-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.tar.gz upstream-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.tar.bz2 upstream-bb7c4cff2086fffddf5cb20e40cfe4979ba1a7e6.zip |
dropbear: backport upstream fix for CVE-2018-15599
CVE description :
The recv_msg_userauth_request function in svr-auth.c in Dropbear through
2018.76 is prone to a user enumeration vulnerability because username
validity affects how fields in SSH_MSG_USERAUTH messages are handled,
a similar issue to CVE-2018-15473 in an unrelated codebase.
Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
Diffstat (limited to 'package/kernel/brcm2708-gpu-fw')
0 files changed, 0 insertions, 0 deletions