From https://github.com/libtom/libtomcrypt/blob/54e6db588a96fe8d29984033c56d105babc88210/changes#L1 -- Fix Side Channel Based ECDSA Key Extraction (CVE-2018-12437) (PR #408) -- Fix potential stack overflow when DER flexi-decoding (CVE-2018-0739) (PR #373) These were fixed in 1.18.2 (1st July 2018), but the bundled version in net-misc/dropbear is 1.18.1 (22nd Jan 2018): https://github.com/mkj/dropbear/blob/e612aec5d9f25a7334d9e2981f1aabf12b889b64/libtomcrypt/changes#L1
We can either update the bundled version or just package it in tree finally.
From 2020.79 release notes: "scp fix for CVE-2018-20685 where a server could modify name of output files"
Note that 2020.79 bumps the bundled versions, so we can do that for now.
x86 stable
arm64 stable
sparc stable
ppc stable
amd64 stable
arm stable
ppc64 stable
s390 stable
hppa: ping
GLSA vote: yes
This issue was resolved and addressed in GLSA 202007-53 at https://security.gentoo.org/glsa/202007-53 by GLSA coordinator Sam James (sam_c).
Reopening for hppa.
hppa stable
Please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=77996c702667b32eec00164b9e2eca0c69a2ba27 commit 77996c702667b32eec00164b9e2eca0c69a2ba27 Author: Sam James <sam@gentoo.org> AuthorDate: 2020-07-29 19:47:56 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2020-07-29 23:11:44 +0000 net-misc/dropbear: security cleanup Bug: https://bugs.gentoo.org/723848 Package-Manager: Portage-3.0.1, Repoman-2.3.23 Signed-off-by: Sam James <sam@gentoo.org> net-misc/dropbear/Manifest | 1 - net-misc/dropbear/dropbear-2019.78.ebuild | 107 ------------------------------ net-misc/dropbear/dropbear-2020.80.ebuild | 105 ----------------------------- 3 files changed, 213 deletions(-)