Skip to content

security: fix CVE-2023-48795#382

Merged
techknowlogick merged 1 commit intocesanta:mainfrom
octoml:CVE-2023-48795
Feb 5, 2024
Merged

security: fix CVE-2023-48795#382
techknowlogick merged 1 commit intocesanta:mainfrom
octoml:CVE-2023-48795

Conversation

@mikecook
Copy link
Contributor

@mikecook mikecook commented Feb 5, 2024

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.

Additionally, match go module version to oldest testing go version.

Commands run:

See:

The SSH transport protocol with certain OpenSSH extensions, found
in OpenSSH before 9.6 and other products, allows remote attackers
to bypass integrity checks such that some packets are omitted
(from the extension negotiation message), and a client and server
may consequently end up with a connection for which some security
features have been downgraded or disabled, aka a Terrapin attack.

Additionally, match go module version to oldest testing go version.

Commands run:
- go get -u golang.org/x/[email protected]
- go mod tidy -go=1.17

See:
- https://nvd.nist.gov/vuln/detail/CVE-2023-48795
- golang/crypto@9d2ee97
@mikecook
Copy link
Contributor Author

mikecook commented Feb 5, 2024

@techknowlogick got another one for you

@techknowlogick
Copy link
Collaborator

@mikecook much appreciated:)

@techknowlogick techknowlogick merged commit fde9a9f into cesanta:main Feb 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants