View | Details | Raw Unified | Return to bug 220158 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+35 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="60931f98-55a7-11e7-8514-589cfc0654e1">
62
    <topic>Dropbear -- two vulnerabilities</topic>
63
    <affects>
64
      <package>
65
	<name>dropbear</name>
66
	<range><lt>2017.75</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Matt Johnston reports:</p>
72
	<blockquote cite="https://matt.ucc.asn.au/dropbear/CHANGES">
73
	  <p>Fix double-free in server TCP listener cleanup A double-free in
74
	    the server could be triggered by an authenticated user if dropbear
75
	    is running with -a (Allow connections to forwarded ports from any
76
	    host) This could potentially allow arbitrary code execution as root
77
	    by an authenticated user.</p>
78
	  <p>Fix information disclosure with ~/.ssh/authorized_keys symlink.
79
	    Dropbear parsed authorized_keys as root, even if it were a symlink.
80
	    The fix is to switch to user permissions when opening authorized_keys.
81
	  </p>
82
	</blockquote>
83
      </body>
84
    </description>
85
    <references>
86
      <url>https://matt.ucc.asn.au/dropbear/CHANGES</url>
87
      <cvename>CVE-2017-9078</cvename>
88
      <cvename>CVE-2017-9079</cvename>
89
    </references>
90
    <dates>
91
      <discovery>2017-05-18</discovery>
92
      <entry>2017-06-20</entry>
93
    </dates>
94
  </vuln>
95
61
  <vuln vid="0c2db2aa-5584-11e7-9a7d-b499baebfeaf">
96
  <vuln vid="0c2db2aa-5584-11e7-9a7d-b499baebfeaf">
62
    <topic>Apache httpd -- several vulnerabilities</topic>
97
    <topic>Apache httpd -- several vulnerabilities</topic>
63
    <affects>
98
    <affects>

Return to bug 220158