dropbear

Description:small SSH 2 client/server designed for small memory environments
License: MIT
Homepage:https://matt.ucc.asn.au/dropbear/dropbear.html
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
2019.78 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
2018.76 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
2017.75 ~ + + + + + ~ + + + + + +

USE flags

  • bsdpty - Add support for legacy BSD pty's rather than dynamic UNIX pty's -- do not use this flag unless you are absolutely sure you actually want it
  • minimal - Install a very minimal build (disables, for example, plugins, fonts, most drivers, non-critical features)
  • multicall - Build all the programs as one little binary (to save space)
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • savedconfig - Use this to restore your config from /etc/portage/savedconfig ${CATEGORY}/${PN}. Make sure your USE flags allow for appropriate dependencies
  • shadow - Enable shadow password support
  • static - !!do not set this during bootstrap!! Causes binaries to be statically linked instead of dynamically
  • syslog - Enable support for syslog
  • zlib - Add support for zlib (de)compression

Security Advisory

Date Severity Title
almost 3 years normal Dropbear: Multiple vulnerabilities
over 3 years normal Dropbear: Privilege escalation
over 6 years normal Dropbear: Multiple vulnerabilities
almost 15 years low OpenSSH, Dropbear: Insecure use of system() call
about 14 years high Dropbear: Privilege escalation

Also available in: Atom

Thank you!