Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

[馃惛 Frogbot] Update version of golang.org/x/crypto to 0.17.0 #2375

Merged

Conversation

github-actions[bot]
Copy link
Contributor

馃毃 This automated pull request was created by Frogbot and fixes the below:

馃摝 Vulnerable Dependencies

鉁嶏笍 Summary

SEVERITY DIRECT DEPENDENCIES IMPACTED DEPENDENCY FIXED VERSIONS CVES

Medium
github.com/spf13/viper:v1.18.1
golang.org/x/crypto:v0.16.0
golang.org/x/net:v0.19.0
github.com/go-git/go-git/v5:v5.11.0
github.com/jfrog/jfrog-cli-core/v2:v2.47.4
github.com/jfrog/jfrog-client-go:v1.35.2
github.com/spf13/afero:v1.11.0
golang.org/x/crypto v0.16.0 [0.17.0] CVE-2023-48795

馃敩 Research Details

Description:
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, and libssh before 0.10.6; and there could be effects on Bitvise SSH through 9.31.


@omerzi omerzi added the safe to test Approve running integration tests on a pull request label Dec 19, 2023
@github-actions github-actions bot removed the safe to test Approve running integration tests on a pull request label Dec 19, 2023
@yahavi yahavi closed this Dec 19, 2023
@yahavi yahavi reopened this Dec 19, 2023
@yahavi yahavi merged commit 1ee4927 into dev Dec 19, 2023
54 of 61 checks passed
@yahavi yahavi deleted the frogbot-golang.org/x/crypto-3c490a20111bdadf5f58c73ad386e01f branch December 19, 2023 07:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants