Security Advisories (4)
CVE-2025-15638 (2026-04-21)

Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt. Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affected by CVE-2016-6129 and CVE-2018-12437.

CVE-2025-40913 (2025-07-16)

Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow. Net::DropbearĀ embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

CVE-2019-12953 (2020-12-30)

Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.

CVE-2016-6129 (2017-02-13)

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

Changes for version 0.05 - 2015-11-28

  • Add on_crypt_passwd to let users crypt the incoming password
  • Improve testing diagnostics

Modules

Use Dropbear SSH inside of perl
Embed and control a Dropbear SSH client inside of perl (Not implemented yet)
Embed and control a Dropbear SSH server inside of perl
XS interface to Dropbear
Manage the authentication information of a user's login attempt.
Manage how a command session should be handled by Dropbear.