#18770 closed bug (fixed)
SSH Terrapin Prefix Truncation Weakness (CVE-2023-48795)
Reported by: | Coldfirex | Owned by: | nobody |
---|---|---|---|
Priority: | normal | Milestone: | Unscheduled |
Component: | Network & Internet | Version: | R1/beta4 |
Keywords: | Cc: | ||
Blocked By: | Blocking: | ||
Platform: | All |
Description
I scanned latet nightly (hrev57531), that has SSH server enabled, with Tenable and it came back as affected by Terrapin.
Looks like we should disable some ssh ciphers to workaround this.
https://www.tenable.com/plugins/nessus/187315 https://www.linuxglobal.com/thwarting-the-terrapin-ssh-attack/
Change History (5)
comment:1 by , 9 months ago
comment:3 by , 9 months ago
PR for 9.6p1 is up at: https://github.com/haikuports/haikuports/pull/10029 Still need to check 32bit, but quick run seems promising on 64bit.
Note:
See TracTickets
for help on using tickets.
Or we should just upgrade OpenSSH and let it use whatever defaults it finds suitable?