CVE description : The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase. Signed-off-by: Hans Dedecker <dedeckeh@gmail.com> |
||
|---|---|---|
| .. | ||
| 010-runtime-maxauthtries.patch | ||
| 020-Wait-to-fail-invalid-usernames.patch | ||
| 100-pubkey_path.patch | ||
| 110-change_user.patch | ||
| 120-openwrt_options.patch | ||
| 130-ssh_ignore_x_args.patch | ||
| 140-disable_assert.patch | ||
| 150-dbconvert_standalone.patch | ||
| 160-lto-jobserver.patch | ||
| 600-allow-blank-root-password.patch | ||
| 610-skip-default-keys-in-custom-runs.patch | ||