Skip to content
Snippets Groups Projects
  1. May 21, 2017
    • Kevin Darbyshire-Bryant's avatar
      dropbear: bump to 2017.75 · 6e10fc74
      Kevin Darbyshire-Bryant authored
      - Security: Fix double-free in server TCP listener cleanup A double-free
      in the server could be triggered by an authenticated user if dropbear is
      running with -a (Allow connections to forwarded ports from any host)
      This could potentially allow arbitrary code execution as root by an
      authenticated user.  Affects versions 2013.56 to 2016.74. Thanks to Mark
      Shepard for reporting the crash.
      CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c
      
      - Security: Fix information disclosure with ~/.ssh/authorized_keys
      symlink.  Dropbear parsed authorized_keys as root, even if it were a
      symlink.  The fix is to switch to user permissions when opening
      authorized_keys
      
      A user could symlink their ~/.ssh/authorized_keys to a root-owned file
      they couldn't normally read. If they managed to get that file to contain
      valid authorized_keys with command= options it might be possible to read
      other contents of that file.
      This information disclosure is to an already authenticated user.
      Thanks to Jann Horn of Google Project Zero for reporting this.
      CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123
      
      
      
      Refresh patches, rework 100-pubkey_path.patch to work with new
      authorized_keys validation.
      
      Signed-off-by: default avatarKevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
      6e10fc74
  2. Feb 10, 2017
  3. Dec 14, 2016
  4. May 13, 2016
  5. Feb 08, 2016
  6. Jan 15, 2016
  7. Sep 08, 2015
  8. Sep 07, 2015
  9. Sep 02, 2015
  10. Apr 18, 2015
  11. Aug 21, 2014
  12. Aug 13, 2014
  13. Aug 11, 2014
  14. Mar 29, 2014
  15. Oct 10, 2013
  16. Dec 04, 2012
  17. Oct 10, 2012
Loading