summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2012-02-23 21:45:36 +0800
committerMatt Johnston <matt@ucc.asn.au>2012-02-23 21:45:36 +0800
commitad1d4c790771dd86c5ea479aa9b2a6700facbaa4 (patch)
tree0c5cdccb07371f36d12994caac13f26857677d58
parentfa5a5b65308f3da8be90c40d602c1589401b0c83 (diff)
downloaddropbear-ad1d4c790771dd86c5ea479aa9b2a6700facbaa4.tar.gz
- Improve CHANGES descriptionDROPBEAR_2012.55
-rw-r--r--CHANGES12
1 files changed, 7 insertions, 5 deletions
diff --git a/CHANGES b/CHANGES
index 8df269a..3e14bad 100644
--- a/CHANGES
+++ b/CHANGES
@@ -1,14 +1,16 @@
2012.55 - Wednesday 22 February 2012
-- Security: Fix use-after-free bug that could be triggered when multiple command sessions were
- made when a command="" authorized_keys restriction was in effect. Possible arbitrary
- code execution to an authenticated user, and probable bypass of the command="" restriction.
- CVE-2012-0920. Thanks to Danny Fullerton of Mantor Organization for reporting the bug
+- Security: Fix use-after-free bug that could be triggered if command="..."
+ authorized_keys restrictions are used. Could allow arbitrary code execution
+ or bypass of the command="..." restriction to an authenticated user.
+ This bug affects releases 0.52 onwards. Ref CVE-2012-0920.
+ Thanks to Danny Fullerton of Mantor Organization for reporting
+ the bug.
- Compile fix, only apply IPV6 socket options if they are available in headers
Thanks to Gustavo Zacarias for the patch
-- Clear key memory on exit
+- Overwrite session key memory on exit
- Fix minor memory leak in unusual PAM authentication configurations.
Thanks to Stathis Voukelatos