Mageia 2024-0002: libssh2 security update
Summary
The SSH transport protocol with certain OpenSSH extensions, found in
OpenSSH before 9.6 and other products, allows remote attackers to bypass
integrity checks such that some packets are omitted (from the extension
negotiation message), and a client and server may consequently end up
with a connection for which some security features have been downgraded
or disabled, aka a Terrapin attack. This occurs because the SSH Binary
Packet Protocol (BPP), implemented by these extensions, mishandles the
handshake phase and mishandles use of sequence numbers.
Our libssh2 packages were also affected, this update fixes the issue.
References
- https://bugs.mageia.org/show_bug.cgi?id=32662
- https://github.com/libssh2/libssh2/issues/1290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
Resolution
MGASA-2024-0002 - Updated libssh2 packages fix a security vulnerability (Terrapin Attack)
SRPMS
- 9/core/libssh2-1.10.0-3.1.mga9