Lucene search

K
mageiaGentoo FoundationMGASA-2024-0004
HistoryJan 08, 2024 - 10:01 p.m.

Updated dropbear package fixes a security vulnerability

2024-01-0822:01:05
Gentoo Foundation
advisories.mageia.org
54
dropbear
package
ssh
vulnerability
prefix truncation
attack
terrapin
man-in-the-middle
security
mitigation
protocol
openssh
strict kex
handshake
putty
libssh
unix

7.4 High

AI Score

Confidence

Low

0.962 High

EPSS

Percentile

99.5%

Parts of the SSH specification are vulnerable to a novel prefix truncation attack (a.k.a. Terrapin attack), which allows a man-in-the-middle attacker to strip an arbitrary number of messages right after the initial key exchange, breaking SSH extension negotiation (RFC8308) in the process and thus downgrading connection security. ### Mitigations To mitigate this protocol vulnerability, OpenSSH suggested a so-called “strict kex” which alters the SSH handshake to ensure a Man-in-the-Middle attacker cannot introduce unauthenticated messages as well as convey sequence number manipulation across handshakes. Support for strict key exchange has been added to a variety of SSH implementations, including OpenSSH itself, PuTTY, libssh, and more. This release includes a patch to implement Strict KEX mode.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchdropbear< 2022.83-2.1dropbear-2022.83-2.1.mga9