Bug 34264 - dropbear new security issue CVE-2025-47203
Summary: dropbear new security issue CVE-2025-47203
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, has_procedure, validated_update
Depends on:
Blocks:
 
Reported: 2025-05-11 09:32 CEST by Nicolas Salguero
Modified: 2025-05-16 21:46 CEST (History)
4 users (show)

See Also:
Source RPM: dropbear-2025.87-1.mga10.src.rpm, dropbear-2022.83-2.1.mga9.src.rpm
CVE: CVE-2025-47203
Status comment: Fixed upstream in 2025.88 and patch available from upstream


Attachments

Nicolas Salguero 2025-05-11 09:33:53 CEST

Whiteboard: (none) => MGA9TOO
Source RPM: (none) => dropbear-2025.87-1.mga10.src.rpm, dropbear-2022.83-2.1.mga9.src.rpm
CVE: (none) => CVE-2025-47203
Status comment: (none) => Fixed upstream in 2025.88 and patch available from upstream

Comment 1 Lewis Smith 2025-05-11 21:17:14 CEST
Assigning to danf; you currently maintain this pkg.

Assignee: bugsquad => dan

Comment 2 Dan Fandrich 2025-05-12 22:35:21 CEST
dropbear-2025.88-1.mga10 fixes this in Cauldron.

Status: NEW => ASSIGNED

Comment 3 Dan Fandrich 2025-05-13 02:26:11 CEST
Here is a regression test procedure to verify that proxy-cmd and multihop functionality still works. First, run "sudo urpmi netcat-openbsd" to install nc. Then, run each of these two commands:

 dbclient -J 'nc git.mageia.org 22' git@git.mageia.org
 dbclient localhost,git@git.mageia.org

When run by a packager on a machine with a locally-accessible ssh server installed on localhost, each of these commands should show a couple of screenfuls of git repository names (likely with bad line endings) but no error messages.
Comment 4 Dan Fandrich 2025-05-13 03:16:10 CEST
Here's another command-line that seems to tickle this vulnerability more directly:

dbclient 'localhost,localhost:22 999;' whoami

This hangs on the vulnerable version and returns the error "dbclient: Exited: Failed to run 'dbclient'" on the fixed version. Note that the vulnerability appears to be in the client only so it should be able to just as easily be tested against an OpenSSH server.


dropbear-2022.83-2.2.mga9 is now available in updates_testing. Here's a suggested advisory:

Advisory
========
dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used.

RPMs:

dropbear-2022.83-2.2.mga9

SRPM:

dropbear-2022.83-2.2.mga9.src.rpm

Link:
https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q2/002385.html

Whiteboard: MGA9TOO => MGA9TOO, has_procedure
Assignee: dan => qa-bugs
CC: (none) => dan

Comment 5 Herman Viaene 2025-05-14 09:59:43 CEST
MGA9-64 Plasma Wayland on Compaq H000SB.
No installation issues.
Ref bug 31119 for testing.
# systemctl stop sshd.service
# systemctl start dropbear.service
# systemctl -l status dropbear.service
● dropbear.service - Dropbear SSH Server Daemon
     Loaded: loaded (/usr/lib/systemd/system/dropbear.service; disabled; preset: disabled)
     Active: active (running) since Wed 2025-05-14 09:54:48 CEST; 15s ago
    Process: 11551 ExecStart=/usr/sbin/dropbear $OPTIONS (code=exited, status=0/SUCCESS)
   Main PID: 11555 (dropbear)
      Tasks: 1 (limit: 8806)
     Memory: 308.0K
        CPU: 9ms
     CGroup: /system.slice/dropbear.service
             └─11555 /usr/sbin/dropbear

May 14 09:54:48 mach3.hviaene.thuis systemd[1]: Starting dropbear.service...
May 14 09:54:48 mach3.hviaene.thuis dropbear[11551]: Failed loading /etc/dropbear/dropbear_ed25519_host_key
May 14 09:54:48 mach3.hviaene.thuis dropbear[11555]: Running in background
May 14 09:54:48 mach3.hviaene.thuis systemd[1]: Started dropbear.service.

Then as normal user:
$ dbclient -o DisableTrivialAuth=yes localhost echo OK

Host 'localhost' is not in the trusted hosts file.
(ecdsa-sha2-nistp256 fingerprint SHA256:xm4I2A07V4saMHeOq+H2DMpDMDzCpE0631xswM4jWM0)
Do you want to continue connecting? (y/n) y
tester9@localhost's password: 
OK

So go.

Whiteboard: MGA9TOO, has_procedure => MGA9TOO, has_procedure, MGA9-64-OK
CC: (none) => herman.viaene

Comment 6 katnatek 2025-05-14 19:43:35 CEST
RH x86_64

dbclient 'localhost,localhost:22 999;' whoami

dbclient: Connection to katnatek@999:22 exited: Connect failed: Connection timed out

dbclient: Connection to katnatek@localhost:22 999;:22 exited: Remote closed the connection
nnection to katnatek@localhost:22 999;:22 exited: Remote closed the connection

installing dropbear-2022.83-2.2.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64
Preparing...                     ##################################################################################################
      1/1: dropbear              ##################################################################################################
      1/1: removing dropbear-2022.83-2.1.mga9.x86_64
                                 ##################################################################################################

dbclient 'localhost,localhost:22 999;' whoami

dbclient: Exited: Failed to run 'dbclient'


dbclient: Connection to katnatek@localhost:22 999;:22 exited: Error writing: Broken pipe

Looks consistent with test suggested in comment#4

Whiteboard: MGA9TOO, has_procedure, MGA9-64-OK => MGA9TOO, MGA9-64-OK
Keywords: (none) => has_procedure
CC: (none) => andrewsfarm

katnatek 2025-05-14 19:44:59 CEST

Keywords: (none) => advisory

Comment 7 Thomas Andrews 2025-05-15 04:37:31 CEST
(In reply to Dan Fandrich from comment #2)
> dropbear-2025.88-1.mga10 fixes this in Cauldron.

Then I'm converting this into a MGA9 bug, and validating.

Whiteboard: MGA9TOO, MGA9-64-OK => MGA9-64-OK
Version: Cauldron => 9
Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2025-05-16 21:46:00 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2025-0158.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.