dropbear: bump version
Fixes two security issues: - The Dropbear server could be made to consume large amounts of memory because decompressed packet sizes weren't checked. Depending on the OS and hardware this might be a denial of service. - Valid users could be identified due to timing variations. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
8fdedb84b1
commit
69b37ad7cc
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
DROPBEAR_VERSION = 2013.58
|
||||
DROPBEAR_VERSION = 2013.59
|
||||
DROPBEAR_SITE = http://matt.ucc.asn.au/dropbear/releases
|
||||
DROPBEAR_SOURCE = dropbear-$(DROPBEAR_VERSION).tar.bz2
|
||||
DROPBEAR_TARGET_BINS = dbclient dropbearkey dropbearconvert scp ssh
|
||||
|
Loading…
Reference in New Issue
Block a user