dropbear

Description:Small SSH 2 client/server designed for small memory environments
Homepage:https://matt.ucc.asn.au/dropbear/dropbear.html
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
2022.83 - - - - - - - - - - - - -

USE flags

  • bsdpty - Add support for legacy BSD pty's rather than dynamic UNIX pty's -- do not use this flag unless you are absolutely sure you actually want it
  • minimal - Install a very minimal build (disables, for example, plugins, fonts, most drivers, non-critical features)
  • multicall - Build all the programs as one little binary (to save space)
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • savedconfig - Use this to restore your config from /etc/portage/savedconfig ${CATEGORY}/${PN}. Make sure your USE flags allow for appropriate dependencies
  • shadow - Enable shadow password support
  • static - !!do not set this during bootstrap!! Causes binaries to be statically linked instead of dynamically
  • syslog - Enable support for syslog
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • verify-sig - Verify upstream signatures on distfiles
  • zlib - Add support for zlib (de)compression

Security Advisory

Date Severity Title
over 4 years normal Dropbear: Multiple vulnerabilities
almost 8 years normal Dropbear: Multiple vulnerabilities
over 8 years normal Dropbear: Privilege escalation
about 11 years normal Dropbear: Multiple vulnerabilities
almost 19 years low OpenSSH, Dropbear: Insecure use of system() call
about 19 years high Dropbear: Privilege escalation

Also available in: Atom

Thank you!