Debian Patches

Status for dropbear/2020.81-3+deb11u2

Patch Description Author Forwarded Bugs Origin Last update
local-options.patch Custom options (overriding those defined in default_options.h)
Cf. upstream's INSTALL file.
Guilhem Moulin <guilhem@debian.org> not-needed 2018-12-10
CVE-2021-36369.patch Added option to disable trivial auth methods
* added option to disable trivial auth methods

* rename argument to match with other ssh clients

* fixed trivial auth detection for pubkeys
Manfred Kaiser <37737811+manfred-kaiser@users.noreply.github.com> yes upstream https://github.com/mkj/dropbear/commit/b2b94acc97254c7fffcb375120eea26c42c65292 2021-08-19
CVE-2023-48795.patch Implement Strict KEX mode
As specified by OpenSSH with kex-strict-c-v00@openssh.com and
kex-strict-s-v00@openssh.com.
Matt Johnston <matt@ucc.asn.au> no debian https://github.com/mkj/dropbear/commit/6e43be5c7b99dbee49dc72b6f989f29fdd7e9356 2023-11-20
fix-noremotetcp-behavior.patch src: svr-tcpfwd: Fix noremotetcp behavior
If noremotetcp is set, we should still reply with
send_msg_request_failed. This matches the behavior
of !DROPBEAR_SVR_REMOTETCPFWD.

We were seeing keepalive packets being ignored when
the "-k" option was used.
Justin Chen <justin.chen@broadcom.com> no debian https://github.com/mkj/dropbear/commit/3cf8344769eda55e26eee53c1898b2c66544f188 2023-09-08

All known versions for source package 'dropbear'

Links