{"id":"ALPINE-CVE-2017-9078","details":"The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.","modified":"2026-03-09T01:10:10.829071Z","published":"2017-05-19T14:29:00.280Z","upstream":["CVE-2017-9078"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-9078"}],"affected":[{"package":{"name":"dropbear","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/dropbear?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2017.75-r0"}]}],"versions":["0.52-r0","0.52-r1","0.52-r2","0.52-r3","0.52-r4","0.53.1-r0","0.53.1-r1","2012.55-r0","2013.58-r0","2014.63-r0","2014.65-r0","2014.66-r0","2014.66-r1","2015.67-r0","2015.68-r0","2015.68-r1","2015.68-r2","2015.70-r2","2015.71-r0","2015.71-r1","2016.73-r0","2016.74-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-9078.json"}},{"package":{"name":"dropbear","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/dropbear?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2017.75-r0"}]}],"versions":["0.52-r0","0.52-r1","0.52-r2","0.52-r3","0.52-r4","0.53.1-r0","0.53.1-r1","2012.55-r0","2013.58-r0","2014.63-r0","2014.65-r0","2014.66-r0","2014.66-r1","2015.67-r0","2015.68-r0","2015.68-r1","2015.68-r2","2015.70-r2","2015.71-r0","2015.71-r1","2016.73-r0","2016.74-r0","2016.74-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-9078.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}