The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. GHSA-45x7-px36-x8w8, CVE-2023-48795 Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin in pypi/paramiko # Credit Thanks to Ionut Lalu for responsibly disclosing this vulnerability to us. # Workarounds In cases where a bump to the latest version of `go-git` is not possible, we recommend limiting its use to only trust-worthy Git servers. # Patches Users running versions of `go-git` from `v4` and above are recommended to upgrade to `v5.11` in order to mitigate this vulnerability. This is a `go-git` implementation issue and does not affect the upstream `git` cli. Applications using only the in-memory filesystem supported by `go-git` are not affected by this vulnerability. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in `go-git` clients. # Impact A denial of service (DoS) vulnerability was discovered in go-git versions prior to `v5.11`. GHSA-mw99-9chc-xw7r, CVE-2023-49568 Maliciously crafted Git server replies can cause DoS on go-git clients in go//go-git/go-git/v5
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |