Bugzilla – Bug 998952
VUL-0: CVE-2016-7406: dropbear: multiple issues
Last modified: 2017-06-19 09:02:12 UTC
CVE-2016-7406: Message printout was vulnerable to format string injection. If specific usernames including "%" symbols can be created on a system (validated by getpwnam()) then an attacker could run arbitrary code as root when connecting to Dropbear server. A dbclient user who can control username or host arguments could potentially run arbitrary code as the dbclient user. This could be a problem if scripts or webpages pass untrusted input to the dbclient program. https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb CVE-2016-7407: dropbearconvert import of OpenSSH keys could run arbitrary code as the local dropbearconvert user when parsing malicious key files https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e CVE-2016-7408: dbclient could run arbitrary code as the local dbclient user if particular -m or -c arguments are provided. This could be an issue where dbclient is used in scripts. https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6 CVE-2016-7409: dbclient or dropbear server could expose process memory to the running user if compiled with DEBUG_TRACE and running with -v https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
bugbot adjusting priority
Not exactly sure why this was assigned to me?
This was fixed 11 month ago by releasing version 2016.74 to Factory, 13.2 and Leap 42.1. The package was also removed from Factory afterwards and is not part of openSUSE Leap 42.2. openSUSE Leap 42.1 is not supported anymore so no further updates are needed. Marking as Resolved.