Date: Tue, 20 Jun 2017 10:57:29 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 220158] security/dropbear: update to 2017.75 Message-ID: <bug-220158-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220158 Bug ID: 220158 Summary: security/dropbear: update to 2017.75 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: pkubaj@anongoth.pl Created attachment 183650 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D183650&action= =3Dedit patch This patch updates the port to 2017.75, fixing CVE-2017-9078 and CVE-2017-9= 079. Changelog: - Security: Fix double-free in server TCP listener cleanup A double-free in= the server could be triggered by an authenticated user if dropbear is running w= ith -a (Allow connections to forwarded ports from any host) This could potentia= lly allow arbitrary code execution as root by an authenticated user. Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash. CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c - Security: Fix information disclosure with ~/.ssh/authorized_keys symlink. Dropbear parsed authorized_keys as root, even if it were a symlink. The fix= is to switch to user permissions when opening authorized_keys A user could sym= link their ~/.ssh/authorized_keys to a root-owned file they couldn't normally re= ad. If they managed to get that file to contain valid authorized_keys with comm= and=3D options it might be possible to read other contents of that file. This information disclosure is to an already authenticated user. Thanks to Jann = Horn of Google Project Zero for reporting this. CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123 - Generate hostkeys with dropbearkey atomically and flush to disk with fsync Thanks to Andrei Gherzan for a patch - Fix out of tree builds with bundled libtom Thanks to Henrik Nordstr=C3=83= =C2=B6m and Peter Krefting for patches. This patch also adds many options for granular choosing ciphers. I tried to make the defaults secure. Builds on Poudriere with 10.3-RELEASE using many variations of options. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-220158-13>