Source: dropbear
Version: 2025.88-2
Severity: grave
Justification: user security hole
Tags: security upstream
X-Debbugs-Cc: Debian Security Team <[email protected]>

Dropbear upstream has recently released 2025.89 [0] which fixes
the following vulnerability [1]:

| Privilege escalation via unix stream forwarding in Dropbear server.
| Other programs on a system may authenticate unix sockets via
| SO_PEERCRED, which would be root user for Dropbear forwarded
| connections, allowing root privilege escalation.
|
| Reported by Turistu, and thanks for advice on the fix.
|
| This is tracked as CVE-2025-14282, and affects 2024.84 to 2025.88.
|
| It is fixed by dropping privileges of the dropbear process after
| authentication. Unix stream sockets are now disallowed when a
| forced command is used, either with authorized_key restrictions or
| "dropbear -c command".
|
| In previous affected releases running with "dropbear -j" (will also
| disable TCP fowarding) or building with
| localoptions.h/distrooptions.h "#define DROPBEAR_SVR_LOCALSTREAMFWD
| 0" is a mitigation.
|
| The full fix of dropping privileges requires the commits in
| https://github.com/mkj/dropbear/pull/391
| https://github.com/mkj/dropbear/pull/394
|
| Unix socket forwarding is now disabled when forced command options
| are used, since it could bypass command restrictions.
| This isn't directly related to the privilege escalation, but could
| allow arbitrary commands to be run as the correct user.

-- 
Guilhem.

[0] https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q4/002390.html
[1] https://seclists.org/oss-sec/2025/q4/279

Attachment: signature.asc
Description: PGP signature

Reply via email to