CVE-2012-0920 needs fixing, server use-after-free
Bug #976360 reported by
Matt Johnston
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
dropbear (Debian) |
Fix Released
|
Unknown
|
|||
dropbear (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Unassigned | ||
Natty |
Fix Released
|
Undecided
|
Unassigned | ||
Oneiric |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Fix Released
|
Undecided
|
Unassigned | ||
Quantal |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
2012.55 was released in February to fix a use-after-free, see http://
Debian also has a backport for 0.52, the bug affects 0.52 to 2011.54.
Related branches
lp://staging/~jtaylor/ubuntu/lucid/dropbear/2012-0920
Rejected
for merging
into
lp://staging/ubuntu/lucid/dropbear
- Jamie Strandboge: Approve
-
Diff: 71 lines (+47/-1)3 files modifieddebian/changelog (+10/-0)
debian/control (+2/-1)
debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff (+35/-0)
lp://staging/~jtaylor/ubuntu/oneiric/dropbear/CVE-2012-0920
Rejected
for merging
into
lp://staging/ubuntu/oneiric/dropbear
- Jamie Strandboge: Approve
- Ubuntu branches: Pending requested
-
Diff: 122 lines (+110/-0)2 files modifieddebian/changelog (+10/-0)
debian/diff/0003-Fix-use-after-free-bug-CVE-2012-0920.diff (+100/-0)
lp://staging/~jtaylor/ubuntu/precise/dropbear/CVE-2012-0920
- Jamie Strandboge: Approve
- Ubuntu branches: Pending requested
-
Diff: 136 lines (+112/-1)3 files modifieddebian/changelog (+10/-0)
debian/control (+2/-1)
debian/diff/0005-Fix-use-after-free-bug-CVE-2012-0920.diff (+100/-0)
CVE References
Changed in dropbear (Debian): | |
status: | Unknown → Fix Released |
To post a comment you must log in.
Thank you for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. I see that you have attached patches to update the Ubuntu packages to the new upstream version. While this work is appreciated, we cannot publish your patches because this does not follow Ubuntu's policy of backporting security patches. If you are able, perhaps you could prepare debdiffs to fix this by following https:/ /wiki.ubuntu. com/SecurityUpd ateProcedures.