Skip to content

Conversation

mikecook
Copy link
Contributor

@mikecook mikecook commented Feb 5, 2024

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.

Additionally, match go module version to oldest testing go version.

Commands run:

  • go get -u golang.org/x/crypto@v0.17.0
  • go mod tidy -go=1.17

See:

The SSH transport protocol with certain OpenSSH extensions, found
in OpenSSH before 9.6 and other products, allows remote attackers
to bypass integrity checks such that some packets are omitted
(from the extension negotiation message), and a client and server
may consequently end up with a connection for which some security
features have been downgraded or disabled, aka a Terrapin attack.

Additionally, match go module version to oldest testing go version.

Commands run:
- go get -u golang.org/x/crypto@v0.17.0
- go mod tidy -go=1.17

See:
- https://nvd.nist.gov/vuln/detail/CVE-2023-48795
- golang/crypto@9d2ee97
@mikecook
Copy link
Contributor Author

mikecook commented Feb 5, 2024

@techknowlogick got another one for you

@techknowlogick
Copy link
Collaborator

@mikecook much appreciated:)

@techknowlogick techknowlogick merged commit fde9a9f into cesanta:main Feb 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants