MGASA-2017-0165

Source
https://advisories.mageia.org/MGASA-2017-0165.html
Import Source
https://advisories.mageia.org/MGASA-2017-0165.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0165
Related
Published
2017-06-10T07:01:18Z
Modified
2017-06-10T06:46:23Z
Summary
Updated dropbear packages fix security vulnerability
Details

A double-free in the server could be triggered by an authenticated user if dropbear is running with -a (CVE-2017-9078). The default Mageia configuration does not set -a, so is not vulnerable

Dropbear parsed authorizedkeys as root, even if it were a symlink. The fix is to switch to user permissions when opening authorizedkeys (CVE-2017-9079)

References
Credits

Affected packages

Mageia:5 / dropbear

Package

Name
dropbear
Purl
pkg:rpm/mageia/dropbear?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2014.66-1.3.mga5

Ecosystem specific

{
    "section": "core"
}