On Sun, 26 Aug 2018 at 14:52:06 +0100, Adam D. Barratt wrote:
> +dropbear (2016.74-5+deb9u1) stable; urgency=medium
>
> Please make the distribution "stretch", and feel free to upload.
Oops yes sorry, uploaded with the correct distribution now.
--
Guilhem.
signature.asc
Description: PGP signa
Processing control commands:
> tags -1 + confirmed
Bug #907124 [release.debian.org] stretch-pu: package dropbear/2016.74-5
Added tag(s) confirmed.
--
907124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907124
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On 2018-08-24 01:45, Guilhem Moulin wrote:
CVE-2018-15599 was recently published for dropbear:
The recv_msg_userauth_request function in svr-auth.c in Dropbear
through 2018.76 is prone to a user enumeration vulnerability
because
username validity affec
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian@packages.debian.org
Usertags: pu
Hi there,
CVE-2018-15599 was recently published for dropbear:
The recv_msg_userauth_request function in svr-auth.c in Dropbear
through 2018.76 is prone to a user enumerati
4 matches
Mail list logo