Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
local-options.patch | Custom options (overriding those defined in default_options.h) Cf. upstream's INSTALL file. |
Guilhem Moulin <guilhem@debian.org> | not-needed | 2018-12-10 | ||
CVE-2021-36369.patch | Added option to disable trivial auth methods * added option to disable trivial auth methods * rename argument to match with other ssh clients * fixed trivial auth detection for pubkeys |
Manfred Kaiser <37737811+manfred-kaiser@users.noreply.github.com> | yes | upstream | https://github.com/mkj/dropbear/commit/b2b94acc97254c7fffcb375120eea26c42c65292 | 2021-08-19 |
CVE-2023-48795.patch | Implement Strict KEX mode As specified by OpenSSH with kex-strict-c-v00@openssh.com and kex-strict-s-v00@openssh.com. |
Matt Johnston <matt@ucc.asn.au> | no | debian | https://github.com/mkj/dropbear/commit/6e43be5c7b99dbee49dc72b6f989f29fdd7e9356 | 2023-11-20 |
fix-noremotetcp-behavior.patch | src: svr-tcpfwd: Fix noremotetcp behavior If noremotetcp is set, we should still reply with send_msg_request_failed. This matches the behavior of !DROPBEAR_SVR_REMOTETCPFWD. We were seeing keepalive packets being ignored when the "-k" option was used. |
Justin Chen <justin.chen@broadcom.com> | no | debian | https://github.com/mkj/dropbear/commit/3cf8344769eda55e26eee53c1898b2c66544f188 | 2023-09-08 |