Bug 1452738 (CVE-2017-9078, CVE-2017-9079) - CVE-2017-9078 CVE-2017-9079 dropbear: Multiple vulnerabilities fixed in 2017.75 version
Summary: CVE-2017-9078 CVE-2017-9079 dropbear: Multiple vulnerabilities fixed in 2017....
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2017-9078, CVE-2017-9079
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1452740 1452741
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-05-19 14:20 UTC by Andrej Nemec
Modified: 2021-02-17 02:07 UTC (History)
4 users (show)

Fixed In Version: dropbear 2017.75
Clone Of:
Environment:
Last Closed: 2019-06-08 03:13:08 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-05-19 14:20:32 UTC
CVE-2017-9078 - The server in Dropbear before 2017.75 might allow post-authentication
root remote code execution because of a double free in cleanup of TCP
listeners when the -a option is enabled.

CVE-2017-9079 - Dropbear before 2017.75 might allow local users to read certain files
as root, if the file has the authorized_keys file format with a
command= option. This occurs because ~/.ssh/authorized_keys is read
with root privileges and symlinks are followed.

External References:

http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html

Comment 1 Andrej Nemec 2017-05-19 14:22:27 UTC
Created dropbear tracking bugs for this issue:

Affects: epel-all [bug 1452741]
Affects: fedora-all [bug 1452740]

Comment 2 Product Security DevOps Team 2019-06-08 03:13:08 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.