[Git][security-tracker-team/security-tracker][master] CVE-2023-48795/paramiko buster is not vulnerable.
Tobias Frost (@tobi)
tobi at debian.org
Sun Jan 14 16:31:50 GMT 2024
Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ff3a5576 by Tobias Frost at 2024-01-14T17:29:22+01:00
CVE-2023-48795/paramiko buster is not vulnerable.
Confirmed by upstream:
https://github.com/paramiko/paramiko/issues/2337#issuecomment-1880185735
paramiko 2.4.2 does neither implement ETM-Mac modes nor ChaCha20.
It also has no EXT_INFO support, which might be a factor for
exploitability.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4829,6 +4829,7 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
- paramiko <unfixed> (bug #1059006)
[bookworm] - paramiko <no-dsa> (Minor issue)
[bullseye] - paramiko <no-dsa> (Minor issue)
+ [buster] - paramiko <not-affected> (ChaCha20-Poly1305 and CBC-EtM support not present)
- phpseclib 1.0.22-1
- php-phpseclib 2.0.46-1
- php-phpseclib3 3.0.35-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff3a5576ad64f41ba1a5fd2d07492c582ef5aa80
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff3a5576ad64f41ba1a5fd2d07492c582ef5aa80
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240114/e8252167/attachment.htm>
More information about the debian-security-tracker-commits
mailing list