pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/dropbear dropbear: update to 2017.75



details:   https://anonhg.NetBSD.org/pkgsrc/rev/a71ede4cc5e0
branches:  trunk
changeset: 371380:a71ede4cc5e0
user:      snj <snj%pkgsrc.org@localhost>
date:      Thu Nov 09 19:00:25 2017 +0000

description:
dropbear: update to 2017.75

Changes:
- Security: Fix double-free in server TCP listener cleanup
  A double-free in the server could be triggered by an authenticated
  user if dropbear is running with -a (Allow connections to forwarded
  ports from any host)
  This could potentially allow arbitrary code execution as root by an
  authenticated user.  Affects versions 2013.56 to 2016.74. Thanks to
  Mark Shepard for reporting the crash.
  CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c

- Security: Fix information disclosure with ~/.ssh/authorized_keys
  symlink.  Dropbear parsed authorized_keys as root, even if it were
  a symlink. The fix is to switch to user permissions when opening
  authorized_keys

  A user could symlink their ~/.ssh/authorized_keys to a root-owned
  file they couldn't normally read. If they managed to get that file
  to contain valid authorized_keys with command= options it might be
  possible to read other contents of that file.
  This information disclosure is to an already authenticated user.
  Thanks to Jann Horn of Google Project Zero for reporting this.
  CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123

- Generate hostkeys with dropbearkey atomically and flush to disk with
  fsync. Thanks to Andrei Gherzan for a patch.

- Fix out of tree builds with bundled libtom
  Thanks to Henrik Nordstr?m and Peter Krefting for patches.

diffstat:

 security/dropbear/Makefile |   4 ++--
 security/dropbear/distinfo |  10 +++++-----
 2 files changed, 7 insertions(+), 7 deletions(-)

diffs (30 lines):

diff -r 2a545b604e6c -r a71ede4cc5e0 security/dropbear/Makefile
--- a/security/dropbear/Makefile        Thu Nov 09 10:57:57 2017 +0000
+++ b/security/dropbear/Makefile        Thu Nov 09 19:00:25 2017 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.33 2017/09/23 20:14:57 wiedi Exp $
+# $NetBSD: Makefile,v 1.34 2017/11/09 19:00:25 snj Exp $
 
-DISTNAME=      dropbear-2016.74
+DISTNAME=      dropbear-2017.75
 CATEGORIES=    security
 MASTER_SITES=  http://matt.ucc.asn.au/dropbear/releases/
 EXTRACT_SUFX=  .tar.bz2
diff -r 2a545b604e6c -r a71ede4cc5e0 security/dropbear/distinfo
--- a/security/dropbear/distinfo        Thu Nov 09 10:57:57 2017 +0000
+++ b/security/dropbear/distinfo        Thu Nov 09 19:00:25 2017 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.24 2017/05/16 21:54:21 snj Exp $
+$NetBSD: distinfo,v 1.25 2017/11/09 19:00:25 snj Exp $
 
-SHA1 (dropbear-2016.74.tar.bz2) = 92483315a112c862667c3e90af854a52dab09a12
-RMD160 (dropbear-2016.74.tar.bz2) = ec0a5a45ce3f636ac25e8f1170aa75cc79cafe12
-SHA512 (dropbear-2016.74.tar.bz2) = c0f4ea7840077b8302b48e27b5b588a4babac6583740dfdb845c40f633aa3ec96174d1d2ade81d2c3e23ea99b75e906312c512d8c7580e6e4105b2dbd37e5e22
-Size (dropbear-2016.74.tar.bz2) = 1622234 bytes
+SHA1 (dropbear-2017.75.tar.bz2) = c30c64dda9db228592e3a97313078ca71d9d283f
+RMD160 (dropbear-2017.75.tar.bz2) = 4ad8fafe8a5dd30066bec27af66a8e98bd6db7ed
+SHA512 (dropbear-2017.75.tar.bz2) = 9c2f2a5e718339f83abc0ad7719bda12bfc75e5bcb87a7c0eec0afefc743e5c0a1575d290d5fde152ff2100b0f0e6fd5ef4431f7bbcb5ca9a332d93c20f5a8f4
+Size (dropbear-2017.75.tar.bz2) = 1623392 bytes
 SHA1 (patch-aa) = d23b69458c54933a4cafa6146ca2167c80453523
 SHA1 (patch-ab) = 8595e4c65d8aa78c8d34af70619ced02f807e77b
 SHA1 (patch-configure) = 95c82b951d16a5cca92a3d4d7ef67b7eb5f47540



Home | Main Index | Thread Index | Old Index