dropbear

Description:small SSH 2 client/server designed for small memory environments
License: MIT
Homepage:https://matt.ucc.asn.au/dropbear/dropbear.html
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
2020.80-r1 ~ + + + ~ ~ ~ ~ ~ + - ~ +

USE flags

  • bsdpty - Add support for legacy BSD pty's rather than dynamic UNIX pty's -- do not use this flag unless you are absolutely sure you actually want it
  • minimal - Install a very minimal build (disables, for example, plugins, fonts, most drivers, non-critical features)
  • multicall - Build all the programs as one little binary (to save space)
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • savedconfig - Use this to restore your config from /etc/portage/savedconfig ${CATEGORY}/${PN}. Make sure your USE flags allow for appropriate dependencies
  • shadow - Enable shadow password support
  • static - !!do not set this during bootstrap!! Causes binaries to be statically linked instead of dynamically
  • syslog - Enable support for syslog
  • zlib - Add support for zlib (de)compression

Security Advisory

Date Severity Title
about 1 month normal Dropbear: Multiple vulnerabilities
over 3 years normal Dropbear: Multiple vulnerabilities
about 4 years normal Dropbear: Privilege escalation
almost 7 years normal Dropbear: Multiple vulnerabilities
over 14 years low OpenSSH, Dropbear: Insecure use of system() call
over 14 years high Dropbear: Privilege escalation

Also available in: Atom

Thank you!