A vulnerability has been found in Dropbear, which allows remote authenticated users to bypass intended shell-command restrictions.
Package | net-misc/dropbear on all architectures |
---|---|
Affected versions | < 2016.73 |
Unaffected versions | >= 2016.73 |
Dropbear is a relatively small SSH server and client.
A CRLF injection vulnerability in Dropbear SSH allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
A remote authenticated user could execute arbitrary code with the privileges of the process.
There is no known workaround at this time.
All Dropbear users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dropbear-2016.73"
Release date
July 20, 2016
Latest revision
July 20, 2016: 1
Severity
normal
Exploitable
remote
Bugzilla entries