Bug 32673

Summary: CVE-2023-48795: Prefix Truncation Attacks in SSH Specification (Terrapin Attack) - jsch
Product: Mageia Reporter: Marja Van Waes <marja11>
Component: SecurityAssignee: Nicolas Lécureuil <mageia>
Status: RESOLVED INVALID QA Contact: Sec team <security>
Severity: critical    
Priority: Normal CC: geiger.david68210, lewyssmith, marja11, nicolas.salguero, pkg-bugs, security, yvesbrungard
Version: Cauldron   
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA9TOO
Source RPM: jsch-0.1.55-8.mga9 CVE: CVE-2023-48795
Status comment:
Bug Depends on:    
Bug Blocks: 32641    

Description Marja Van Waes 2023-12-31 18:11:27 CET
+++ This bug was initially created as a clone of Bug #32641 +++

That CVE was announced here:
https://www.openwall.com/lists/oss-security/2023/12/18/3
https://www.openwall.com/lists/oss-security/2023/12/19/5
https://www.openwall.com/lists/oss-security/2023/12/20/3

Many SSH implementations that are packaged in Mageia are affected:
<snip>
  - jsch
Other than the SPEC file says, jsch seems to live in github nowadays and 0.2.15 is the version with the fix for CVE-48795
https://github.com/mwiede/jsch/releases/tag/jsch-0.2.15
Marja Van Waes 2023-12-31 18:13:28 CET

Whiteboard: (none) => MGA9TOO

Marja Van Waes 2024-01-02 12:00:26 CET

CVE: (none) => CVE-2023-48795

Nicolas Salguero 2024-01-19 16:12:02 CET

Blocks: (none) => 32748

Nicolas Salguero 2024-01-19 16:16:44 CET

Blocks: 32748 => (none)

Comment 1 Nicolas Salguero 2024-04-04 09:43:34 CEST
According to https://security-tracker.debian.org/tracker/CVE-2023-48795, our version is not affected because:
  - ChaCha20-Poly1305 support was introduced in 0.1.61;
  - *-EtM support was introduced in 0.1.58.

Resolution: (none) => INVALID
Status: NEW => RESOLVED