Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 20 Jun 2017 10:57:29 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 220158] security/dropbear: update to 2017.75
Message-ID:  <bug-220158-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220158

            Bug ID: 220158
           Summary: security/dropbear: update to 2017.75
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: pkubaj@anongoth.pl

Created attachment 183650
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D183650&action=
=3Dedit
patch

This patch updates the port to 2017.75, fixing CVE-2017-9078 and CVE-2017-9=
079.
Changelog:
- Security: Fix double-free in server TCP listener cleanup A double-free in=
 the
server could be triggered by an authenticated user if dropbear is running w=
ith
-a (Allow connections to forwarded ports from any host) This could potentia=
lly
allow arbitrary code execution as root by an authenticated user. Affects
versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash.
CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c

- Security: Fix information disclosure with ~/.ssh/authorized_keys symlink.
Dropbear parsed authorized_keys as root, even if it were a symlink. The fix=
 is
to switch to user permissions when opening authorized_keys A user could sym=
link
their ~/.ssh/authorized_keys to a root-owned file they couldn't normally re=
ad.
If they managed to get that file to contain valid authorized_keys with comm=
and=3D
options it might be possible to read other contents of that file. This
information disclosure is to an already authenticated user. Thanks to Jann =
Horn
of Google Project Zero for reporting this. CVE-2017-9079
https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123

- Generate hostkeys with dropbearkey atomically and flush to disk with fsync
Thanks to Andrei Gherzan for a patch

- Fix out of tree builds with bundled libtom Thanks to Henrik Nordstr=C3=83=
=C2=B6m and
Peter Krefting for patches.

This patch also adds many options for granular choosing ciphers. I tried to
make the defaults secure.

Builds on Poudriere with 10.3-RELEASE using many variations of options.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-220158-13>