comparison CHANGES @ 1344:b90da477ab63 coverity

merge coverity
author Matt Johnston <matt@ucc.asn.au>
date Thu, 18 May 2017 23:02:39 +0800
parents c31276613181
children 1a3c4ec0f840
comparison
equal deleted inserted replaced
1318:10e2a7727253 1344:b90da477ab63
1 2017.75 - 18 May 2017
2
3 - Security: Fix double-free in server TCP listener cleanup
4 A double-free in the server could be triggered by an authenticated user if
5 dropbear is running with -a (Allow connections to forwarded ports from any host)
6 This could potentially allow arbitrary code execution as root by an authenticated user.
7 Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash.
8
9 - Security: Fix information disclosure with ~/.ssh/authorized_keys symlink.
10 Dropbear parsed authorized_keys as root, even if it were a symlink. The fix
11 is to switch to user permissions when opening authorized_keys
12
13 A user could symlink their ~/.ssh/authorized_keys to a root-owned file they
14 couldn't normally read. If they managed to get that file to contain valid
15 authorized_keys with command= options it might be possible to read other
16 contents of that file.
17 This information disclosure is to an already authenticated user.
18 Thanks to Jann Horn of Google Project Zero for reporting this.
19
20 - Generate hostkeys with dropbearkey atomically and flush to disk with fsync
21 Thanks to Andrei Gherzan for a patch
22
23 - Fix out of tree builds with bundled libtom
24 Thanks to Henrik Nordström and Peter Krefting for patches.
25
1 2016.74 - 21 July 2016 26 2016.74 - 21 July 2016
2 27
3 - Security: Message printout was vulnerable to format string injection. 28 - Security: Message printout was vulnerable to format string injection.
4 29
5 If specific usernames including "%" symbols can be created on a system 30 If specific usernames including "%" symbols can be created on a system
7 when connecting to Dropbear server. 32 when connecting to Dropbear server.
8 33
9 A dbclient user who can control username or host arguments could potentially 34 A dbclient user who can control username or host arguments could potentially
10 run arbitrary code as the dbclient user. This could be a problem if scripts 35 run arbitrary code as the dbclient user. This could be a problem if scripts
11 or webpages pass untrusted input to the dbclient program. 36 or webpages pass untrusted input to the dbclient program.
37 CVE-2016-7406
38 https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
12 39
13 - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as 40 - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as
14 the local dropbearconvert user when parsing malicious key files 41 the local dropbearconvert user when parsing malicious key files
42 CVE-2016-7407
43 https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
15 44
16 - Security: dbclient could run arbitrary code as the local dbclient user if 45 - Security: dbclient could run arbitrary code as the local dbclient user if
17 particular -m or -c arguments are provided. This could be an issue where 46 particular -m or -c arguments are provided. This could be an issue where
18 dbclient is used in scripts. 47 dbclient is used in scripts.
48 CVE-2016-7408
49 https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
19 50
20 - Security: dbclient or dropbear server could expose process memory to the 51 - Security: dbclient or dropbear server could expose process memory to the
21 running user if compiled with DEBUG_TRACE and running with -v 52 running user if compiled with DEBUG_TRACE and running with -v
53 CVE-2016-7409
54 https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
22 55
23 The security issues were reported by an anonymous researcher working with 56 The security issues were reported by an anonymous researcher working with
24 Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html 57 Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html
25 58
26 - Fix port forwarding failure when connecting to domains that have both 59 - Fix port forwarding failure when connecting to domains that have both
62 95
63 2016.72 - 9 March 2016 96 2016.72 - 9 March 2016
64 97
65 - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions, 98 - Validate X11 forwarding input. Could allow bypass of authorized_keys command= restrictions,
66 found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116 99 found by github.com/tintinweb. Thanks for Damien Miller for a patch. CVE-2016-3116
100 https://secure.ucc.asn.au/hg/dropbear/rev/a3e8389e01ff
67 101
68 2015.71 - 3 December 2015 102 2015.71 - 3 December 2015
69 103
70 - Fix "bad buf_incrpos" when data is transferred, broke in 2015.69 104 - Fix "bad buf_incrpos" when data is transferred, broke in 2015.69
71 105
340 Patch from Martin Donnelly 374 Patch from Martin Donnelly
341 375
342 - Limit the size of decompressed payloads, avoids memory exhaustion denial 376 - Limit the size of decompressed payloads, avoids memory exhaustion denial
343 of service 377 of service
344 Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421 378 Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421
379 https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f
345 380
346 - Avoid disclosing existence of valid users through inconsistent delays 381 - Avoid disclosing existence of valid users through inconsistent delays
347 Thanks to Logan Lamb for reporting. CVE-2013-4434 382 Thanks to Logan Lamb for reporting. CVE-2013-4434
383 https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a
348 384
349 - Update config.guess and config.sub for newer architectures 385 - Update config.guess and config.sub for newer architectures
350 386
351 - Avoid segfault in server for locked accounts 387 - Avoid segfault in server for locked accounts
352 388
445 authorized_keys restrictions are used. Could allow arbitrary code execution 481 authorized_keys restrictions are used. Could allow arbitrary code execution
446 or bypass of the command="..." restriction to an authenticated user. 482 or bypass of the command="..." restriction to an authenticated user.
447 This bug affects releases 0.52 onwards. Ref CVE-2012-0920. 483 This bug affects releases 0.52 onwards. Ref CVE-2012-0920.
448 Thanks to Danny Fullerton of Mantor Organization for reporting 484 Thanks to Danny Fullerton of Mantor Organization for reporting
449 the bug. 485 the bug.
486 https://secure.ucc.asn.au/hg/dropbear/rev/818108bf7749
450 487
451 - Compile fix, only apply IPV6 socket options if they are available in headers 488 - Compile fix, only apply IPV6 socket options if they are available in headers
452 Thanks to Gustavo Zacarias for the patch 489 Thanks to Gustavo Zacarias for the patch
453 490
454 - Overwrite session key memory on exit 491 - Overwrite session key memory on exit