[3.2] dropbear: Multiple vulnerabilities (CVE-2017-9078, CVE-2017-9079)
CVE-2017-9078 - The server in Dropbear before 2017.75 might allow
post-authentication
root remote code execution because of a double free in cleanup of TCP
listeners when the -a option is enabled.
CVE-2017-9079 - Dropbear before 2017.75 might allow local users to
read certain files
as root, if the file has the authorized_keys file format with a
command= option. This occurs because ~/.ssh/authorized_keys is read
with root privileges and symlinks are followed.
Fixed In Version:
dropbear 2017.75
References:
http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
https://nvd.nist.gov/vuln/detail/CVE-2017-9078
https://nvd.nist.gov/vuln/detail/CVE-2017-9079
(from redmine: issue id 7302, created on 2017-05-22, closed on 2017-06-15)
- Relations:
- parent #7297 (closed)
- Changesets:
- Revision 9ee60284 on 2017-06-13T12:29:49Z:
main/dropbear: security upgrade to 2017.75 (CVE-2017-9078, CVE-2017-9079)
Fixes #7302