aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/dropbear/patches/100-pubkey_path.patch
diff options
context:
space:
mode:
authorHans Dedecker <dedeckeh@gmail.com>2018-08-24 15:02:24 +0200
committerHans Dedecker <dedeckeh@gmail.com>2018-08-24 15:25:26 +0200
commit2211ee0037764e1c6b1576fe7a0975722cd4acdc (patch)
tree03c9ee59073f6d331c964410f0f23a83ea0577c2 /package/network/services/dropbear/patches/100-pubkey_path.patch
parentbbe2cf657ca72119288a441ca3337a503aa17f80 (diff)
downloadupstream-2211ee0037764e1c6b1576fe7a0975722cd4acdc.tar.gz
upstream-2211ee0037764e1c6b1576fe7a0975722cd4acdc.tar.bz2
upstream-2211ee0037764e1c6b1576fe7a0975722cd4acdc.zip
dropbear: backport upstream fix for CVE-2018-15599
CVE description : The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
Diffstat (limited to 'package/network/services/dropbear/patches/100-pubkey_path.patch')
-rw-r--r--package/network/services/dropbear/patches/100-pubkey_path.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/network/services/dropbear/patches/100-pubkey_path.patch b/package/network/services/dropbear/patches/100-pubkey_path.patch
index 401c7e1ba5..274d3af46a 100644
--- a/package/network/services/dropbear/patches/100-pubkey_path.patch
+++ b/package/network/services/dropbear/patches/100-pubkey_path.patch
@@ -1,6 +1,6 @@
--- a/svr-authpubkey.c
+++ b/svr-authpubkey.c
-@@ -220,14 +220,20 @@ static int checkpubkey(char* algo, unsig
+@@ -229,14 +229,20 @@ static int checkpubkey(char* algo, unsig
goto out;
}
@@ -29,7 +29,7 @@
/* open the file as the authenticating user. */
origuid = getuid();
-@@ -396,26 +402,35 @@ static int checkpubkeyperms() {
+@@ -405,26 +411,35 @@ static int checkpubkeyperms() {
goto out;
}