[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
CVE-2023-48795: Backporting strict key exchange to older libssh
[Thread Prev] | [Thread Next]
[Date Prev] | [Date Next]
- Subject: CVE-2023-48795: Backporting strict key exchange to older libssh
- From: Sean Whitton <spwhitton@xxxxxxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Sat, 30 Dec 2023 19:33:00 +0000
- To: libssh@xxxxxxxxxx, Aris Adamantiadis <aris@xxxxxxxxxxxx>, Jakub Jelen <jjelen@xxxxxxxxxx>
- Cc: team@xxxxxxxxxxxxxxxxxxx, libssh@xxxxxxxxxxxxxxxxxxx, debian-lts@xxxxxxxxxxxxxxxx
Hello, I am working to backport the fix for CVE-2023-48795 to libssh 0.8.7, as part of Debian's Long Term Support effort, funded by Freexian SARL. (I will later be seeking to backport the fix to 0.7.3 and 0.6.3 too, as part of Freexian's Extended Long Term Support effort.) I have two queries about this, if I may. (1) These older libssh do not include the rekeying as implemented in commit 58cae236. Is that rekeying necessary for the strict key exchange to be effective? (2) Does anyone have a utility that tests the strict key exchange? Or, does the regular test suite already exercise the relevant code? I'm asking because the vulnerability scanner on terrapin-attack.com only seems to check for support of strict key exchange, not whether it actually works. Thanks. -- Sean Whitton
Attachment:
signature.asc
Description: PGP signature
Archive administrator: postmaster@lists.cynapses.org