+++ This bug was initially created as a clone of Bug #32641 +++ That CVE was announced here: https://www.openwall.com/lists/oss-security/2023/12/18/3 https://www.openwall.com/lists/oss-security/2023/12/19/5 https://www.openwall.com/lists/oss-security/2023/12/20/3 Many SSH implementations that are packaged in Mageia are affected: <snip> - jsch Other than the SPEC file says, jsch seems to live in github nowadays and 0.2.15 is the version with the fix for CVE-48795 https://github.com/mwiede/jsch/releases/tag/jsch-0.2.15
Whiteboard: (none) => MGA9TOO
CVE: (none) => CVE-2023-48795
Blocks: (none) => 32748
Blocks: 32748 => (none)
According to https://security-tracker.debian.org/tracker/CVE-2023-48795, our version is not affected because: - ChaCha20-Poly1305 support was introduced in 0.1.61; - *-EtM support was introduced in 0.1.58.
Resolution: (none) => INVALIDStatus: NEW => RESOLVED