| Summary: | dropbear new security issue CVE-2012-0920 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | critical | ||
| Priority: | Normal | CC: | davidwhodgins, mageia, stormi-mageia, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | MGA1-32-OK MGA1-64-OK | ||
| Source RPM: | dropbear-0.53.1-2.mga1.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-04-25 19:25:20 CEST
David Walser
2012-04-25 19:25:32 CEST
CC:
(none) =>
stormi The upstream fix that went into 2012.55 is different. Here's the RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=800655
David Walser
2012-05-01 21:06:12 CEST
CC:
(none) =>
mageia I asked upstream twice if my patch was OK and got no response. Since there's no PoC we can find, we'll upgrade to 2012.55 to be sure of the fix. Advisory: ======================== Updated dropbear package fixes security vulnerability: Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency" (CVE-2012-0920). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0920 http://www.debian.org/security/2012/dsa-2456 ======================== Updated packages in core/updates_testing: ======================== dropbear-2012.55-1.mga1 from dropbear-2012.55-1.mga1.src.rpm Assignee:
bugsquad =>
qa-bugs
David Walser
2012-08-08 22:39:48 CEST
Severity:
normal =>
critical Just testing that dropbear is working as an ssh server. Testing complete on Mageia 1 i586. I'll test x86-64 shortly. CC:
(none) =>
davidwhodgins Testing complete on Mageia 1 x86-64. Could someone form the sysadmin team push the srpm dropbear-2012.55-1.mga1.src.rpm from Mageia 1 Core Updates Testing to Core Updates. Advisory: Updated dropbear package fixes security vulnerability: Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command requests, related to "channels concurrency" (CVE-2012-0920). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0920 http://www.debian.org/security/2012/dsa-2456 https://bugs.mageia.org/show_bug.cgi?id=5611 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0205 Status:
NEW =>
RESOLVED |