Bug 1218134 - VUL-0: CVE-2023-48795: jsch: prefix truncation breaking ssh channel integrity
Summary: VUL-0: CVE-2023-48795: jsch: prefix truncation breaking ssh channel integrity
Status: RESOLVED FIXED
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Gus Kenion
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/387549/
Whiteboard:
Keywords:
Depends on:
Blocks: CVE-2023-48795
  Show dependency treegraph
 
Reported: 2023-12-17 11:49 UTC by Marcus Meissner
Modified: 2024-02-05 16:30 UTC (History)
8 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Marcus Meissner 2023-12-17 12:27:10 UTC
chacha20-poly1305 was added in jsch 0.1.66.
MAC etms were added in jsch 0.1.58.


currently not yet shipped for SLES, but already in the QA queue.
Comment 2 Marcus Meissner 2023-12-18 15:35:29 UTC
terrapin attack is now public

https://terrapin-attack.com/
Comment 3 Marcus Meissner 2023-12-19 16:26:21 UTC
jsch-0.2.15  is being prepared with the fixes (tagged already, release is not yet there).

We should just update to that.

https://github.com/mwiede/jsch/releases
Comment 7 OBSbugzilla Bot 2024-01-12 13:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1218134) was mentioned in
https://build.opensuse.org/request/show/1138302 Factory / jsch
Comment 9 Gus Kenion 2024-02-02 15:08:09 UTC
Upgraded jsch to version 0.2.15, and dependency bouncycastle to 1.77 in SLE and ALP
Comment 11 Maintenance Automation 2024-02-05 16:30:12 UTC
SUSE-SU-2024:0327-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1218134
CVE References: CVE-2023-48795
Sources used:
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Enterprise Storage 7.1 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
openSUSE Leap 15.5 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
Development Tools Module 15-SP5 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Manager Server 4.3 Module 4.3 (src): jsch-0.2.15-150200.11.13.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): jsch-0.2.15-150200.11.13.1, bouncycastle-1.77-150200.3.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.