Your message dated Fri, 19 May 2017 22:18:45 +0000
with message-id <e1dbqep-000cpu...@fasolo.debian.org>
and subject line Bug#862970: fixed in dropbear 2016.74-5
has caused the Debian Bug report #862970,
regarding dropbear: Double-free in server TCP listener cleanup (CVE-2017-9078); 
information disclosure with ~/.ssh/authorized_keys symlink (CVE-2017-9079)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
862970: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862970
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: dropbear
Version: 2014.65-1+deb8u2
Severity: grave
Tags: security
Justification: user security hole

dropbear 2017.75 was released [0] on May 18 and fixes the following two
security vulnerabilities, for which no CVE was assigned yet AFAIK [1].

    - Security: Fix double-free in server TCP listener cleanup
      A double-free in the server could be triggered by an authenticated
      user if dropbear is running with -a (Allow connections to
      forwarded ports from any host) This could potentially allow
      arbitrary code execution as root by an authenticated user.
      Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for
      reporting the crash.

    Patch: https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c

    - Security: Fix information disclosure with ~/.ssh/authorized_keys
      symlink.
      Dropbear parsed authorized_keys as root, even if it were a
      symlink. The fix is to switch to user permissions when opening
      authorized_keys

      A user could symlink their ~/.ssh/authorized_keys to a root-owned
      file they couldn't normally read. If they managed to get that file
      to contain valid authorized_keys with command= options it might be
      possible to read other contents of that file.
      This information disclosure is to an already authenticated user.
      Thanks to Jann Horn of Google Project Zero for reporting this.

    Patch: https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123

-- 
Guilhem.

[0] http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
        https://matt.ucc.asn.au/dropbear/CHANGES (currently yields 403)
[1] http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001987.html

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: dropbear
Source-Version: 2016.74-5

We believe that the bug you reported is fixed in the latest version of
dropbear, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 862...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Guilhem Moulin <guil...@debian.org> (supplier of updated dropbear package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 19 May 2017 23:41:21 +0200
Source: dropbear
Binary: dropbear-bin dropbear-run dropbear-initramfs dropbear
Architecture: source amd64 all
Version: 2016.74-5
Distribution: unstable
Urgency: high
Maintainer: Guilhem Moulin <guil...@debian.org>
Changed-By: Guilhem Moulin <guil...@debian.org>
Description:
 dropbear   - transitional dummy package for dropbear-{run,initramfs}
 dropbear-bin - lightweight SSH2 server and client - command line tools
 dropbear-initramfs - lightweight SSH2 server and client - initramfs integration
 dropbear-run - lightweight SSH2 server and client - startup scripts
Closes: 862970
Changes:
 dropbear (2016.74-5) unstable; urgency=high
 .
   * Backport security fixes from 2017.75 (closes: #862970):
     - CVE-2017-9078: Fix double-free in server TCP listener cleanup
       A double-free in the server could be triggered by an authenticated user
       if dropbear is running with -a (Allow connections to forwarded ports
       from any host) This could potentially allow arbitrary code execution as
       root by an authenticated user.
     - CVE-2017-9079: Fix information disclosure with ~/.ssh/authorized_keys
       symlink.
       Dropbear parsed authorized_keys as root, even if it were a symlink. The
       fix is to switch to user permissions when opening authorized_keys
       A user could symlink their ~/.ssh/authorized_keys to a root-owned file
       they couldn't normally read. If they managed to get that file to contain
       valid authorized_keys with command= options it might be possible to read
       other contents of that file.
       This information disclosure is to an already authenticated user.
Checksums-Sha1:
 5ff95c319707373b30b43e3132df947d54a24ff3 2134 dropbear_2016.74-5.dsc
 ffd6dbe1eaa1056e6841afd5924e00e358272c63 22072 dropbear_2016.74-5.debian.tar.xz
 f15c6d827a8ba1d9bcfc6ffe3893b34011b5dfca 1252406 
dropbear-bin-dbgsym_2016.74-5_amd64.deb
 708ed45be0f41276d00dd1899f317ba377d43596 183340 
dropbear-bin_2016.74-5_amd64.deb
 133975e25e11b193c6b5d446a2503d8d2acbe581 36564 
dropbear-initramfs_2016.74-5_all.deb
 716cd21d211d82d6ca1d2609906578c36857274f 34152 dropbear-run_2016.74-5_all.deb
 4ceacd70c534deaacbd89f37f6bed347c3a2f162 31838 dropbear_2016.74-5_all.deb
 41ae76b614cad65cbab12a9e83dfd453b72cdb8d 6549 
dropbear_2016.74-5_amd64.buildinfo
Checksums-Sha256:
 6e0625a8e52c3a3f6dd5fd45730bbe8ab6c48cbab0a309a8804996bdda59b722 2134 
dropbear_2016.74-5.dsc
 719b0b7a84053062d35e02c8811d415f2178f032c1a0e584918e98eb23a62b8a 22072 
dropbear_2016.74-5.debian.tar.xz
 fae772c49c7b751ad2cb1cef7d959de5b7d1c667d7254dd5925107dcd945afcd 1252406 
dropbear-bin-dbgsym_2016.74-5_amd64.deb
 00d9135e8a1d652262662420533a5de3516490863d3ab1bb98a9234fa0ff0d63 183340 
dropbear-bin_2016.74-5_amd64.deb
 9685107d7af4955d5b802f86fff9b326a5e9b437ede3e03da7f8c3156c895b1c 36564 
dropbear-initramfs_2016.74-5_all.deb
 169145a775fc747f97252d29b468c3637aa946d6715062b7910bea8ade2be789 34152 
dropbear-run_2016.74-5_all.deb
 557299fb6f8c27ba1f0481d0ca82db301133e4dfb32582f8133ddc9894a3a3e9 31838 
dropbear_2016.74-5_all.deb
 948113dcb43d36ac1d3dc150d8c73ae52bb1aa98f0d60a62ef3c53fe211990dd 6549 
dropbear_2016.74-5_amd64.buildinfo
Files:
 c9d5b3307f283692f2014f1c62edf5b8 2134 net optional dropbear_2016.74-5.dsc
 c092761dce400b84472e066506787895 22072 net optional 
dropbear_2016.74-5.debian.tar.xz
 4017fe6ad92831c93bc7b7928e8e86eb 1252406 debug extra 
dropbear-bin-dbgsym_2016.74-5_amd64.deb
 6a84c552f1e4eb28ca9e54d9e26284fb 183340 net optional 
dropbear-bin_2016.74-5_amd64.deb
 6e7e3bc503b93199ebaf41896170a73b 36564 net optional 
dropbear-initramfs_2016.74-5_all.deb
 9a745a9b83c7718411930514ab9eaeb8 34152 net optional 
dropbear-run_2016.74-5_all.deb
 935f1840ef24d1d7dfc20f8219101ff9 31838 oldlibs extra dropbear_2016.74-5_all.deb
 f30f95df9e12015bcee4970848fff63b 6549 net optional 
dropbear_2016.74-5_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qMgp
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to