summaryrefslogtreecommitdiff
path: root/security/dropbear/distinfo
diff options
context:
space:
mode:
authorsnj <snj@pkgsrc.org>2017-11-09 19:00:25 +0000
committersnj <snj@pkgsrc.org>2017-11-09 19:00:25 +0000
commit056a63de2062b0b0646dc241a8444db268c424ed (patch)
tree676a404adfa0273b0888e307373ac4dd4f337c84 /security/dropbear/distinfo
parent7201c9656c469b623f994402db26b7521e5b17f0 (diff)
downloadpkgsrc-056a63de2062b0b0646dc241a8444db268c424ed.tar.gz
dropbear: update to 2017.75
Changes: - Security: Fix double-free in server TCP listener cleanup A double-free in the server could be triggered by an authenticated user if dropbear is running with -a (Allow connections to forwarded ports from any host) This could potentially allow arbitrary code execution as root by an authenticated user. Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash. CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c - Security: Fix information disclosure with ~/.ssh/authorized_keys symlink. Dropbear parsed authorized_keys as root, even if it were a symlink. The fix is to switch to user permissions when opening authorized_keys A user could symlink their ~/.ssh/authorized_keys to a root-owned file they couldn't normally read. If they managed to get that file to contain valid authorized_keys with command= options it might be possible to read other contents of that file. This information disclosure is to an already authenticated user. Thanks to Jann Horn of Google Project Zero for reporting this. CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123 - Generate hostkeys with dropbearkey atomically and flush to disk with fsync. Thanks to Andrei Gherzan for a patch. - Fix out of tree builds with bundled libtom Thanks to Henrik Nordström and Peter Krefting for patches.
Diffstat (limited to 'security/dropbear/distinfo')
-rw-r--r--security/dropbear/distinfo10
1 files changed, 5 insertions, 5 deletions
diff --git a/security/dropbear/distinfo b/security/dropbear/distinfo
index 18b863fee48..b7c4d977625 100644
--- a/security/dropbear/distinfo
+++ b/security/dropbear/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.24 2017/05/16 21:54:21 snj Exp $
+$NetBSD: distinfo,v 1.25 2017/11/09 19:00:25 snj Exp $
-SHA1 (dropbear-2016.74.tar.bz2) = 92483315a112c862667c3e90af854a52dab09a12
-RMD160 (dropbear-2016.74.tar.bz2) = ec0a5a45ce3f636ac25e8f1170aa75cc79cafe12
-SHA512 (dropbear-2016.74.tar.bz2) = c0f4ea7840077b8302b48e27b5b588a4babac6583740dfdb845c40f633aa3ec96174d1d2ade81d2c3e23ea99b75e906312c512d8c7580e6e4105b2dbd37e5e22
-Size (dropbear-2016.74.tar.bz2) = 1622234 bytes
+SHA1 (dropbear-2017.75.tar.bz2) = c30c64dda9db228592e3a97313078ca71d9d283f
+RMD160 (dropbear-2017.75.tar.bz2) = 4ad8fafe8a5dd30066bec27af66a8e98bd6db7ed
+SHA512 (dropbear-2017.75.tar.bz2) = 9c2f2a5e718339f83abc0ad7719bda12bfc75e5bcb87a7c0eec0afefc743e5c0a1575d290d5fde152ff2100b0f0e6fd5ef4431f7bbcb5ca9a332d93c20f5a8f4
+Size (dropbear-2017.75.tar.bz2) = 1623392 bytes
SHA1 (patch-aa) = d23b69458c54933a4cafa6146ca2167c80453523
SHA1 (patch-ab) = 8595e4c65d8aa78c8d34af70619ced02f807e77b
SHA1 (patch-configure) = 95c82b951d16a5cca92a3d4d7ef67b7eb5f47540