Denial of Service in dropbear
ID: | FEDORA-2013-18703 |
Distribution: | Fedora |
Plattformen: | Fedora 20 |
Datum: | So, 10. November 2013, 22:31 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4421 |
Applikationen: | Dropbear SSH |
Originalnachricht |
|
Name : dropbear Product : Fedora 20 Version : 2013.59 Release : 1.fc20 URL : http://matt.ucc.asn.au/dropbear/dropbear.html Summary : A lightweight SSH server and client Description : Dropbear is a relatively small SSH server and client. Dropbear is particularly useful for "embedded"-type Linux (or other Unix) systems, such as wireless routers. -------------------------------------------------------------------------------- Update Information: New version/Unbundle libtom*/harden build/AArch64 support. [edited]: CVE-2013-4421 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1017983 - CVE-2013-4421 dropbear: memory exhaustion DoS via large decompressed payloads https://bugzilla.redhat.com/show_bug.cgi?id=1017983 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update dropbear' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce |