[Git][security-tracker-team/security-tracker][master] CVE-2023-48795/paramiko buster is not vulnerable.

Tobias Frost (@tobi) tobi at debian.org
Sun Jan 14 16:31:50 GMT 2024



Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ff3a5576 by Tobias Frost at 2024-01-14T17:29:22+01:00
CVE-2023-48795/paramiko buster is not vulnerable.

Confirmed by upstream:
https://github.com/paramiko/paramiko/issues/2337#issuecomment-1880185735

paramiko 2.4.2 does neither implement ETM-Mac modes nor ChaCha20.
It also has no EXT_INFO support, which might be a factor for
exploitability.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4829,6 +4829,7 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
 	- paramiko <unfixed> (bug #1059006)
 	[bookworm] - paramiko <no-dsa> (Minor issue)
 	[bullseye] - paramiko <no-dsa> (Minor issue)
+        [buster] - paramiko <not-affected> (ChaCha20-Poly1305 and CBC-EtM support not present)
 	- phpseclib 1.0.22-1
 	- php-phpseclib 2.0.46-1
 	- php-phpseclib3 3.0.35-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff3a5576ad64f41ba1a5fd2d07492c582ef5aa80

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff3a5576ad64f41ba1a5fd2d07492c582ef5aa80
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240114/e8252167/attachment.htm>


More information about the debian-security-tracker-commits mailing list