aboutsummaryrefslogtreecommitdiff
path: root/website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc
diff options
context:
space:
mode:
Diffstat (limited to 'website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc')
-rw-r--r--website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc152
1 files changed, 152 insertions, 0 deletions
diff --git a/website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc b/website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc
new file mode 100644
index 0000000000..0e66dbadd5
--- /dev/null
+++ b/website/static/security/advisories/FreeBSD-SA-23:19.openssh.asc
@@ -0,0 +1,152 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-23:19.openssh Security Advisory
+ The FreeBSD Project
+
+Topic: Prefix Truncation Attack in the SSH protocol
+
+Category: contrib
+Module: openssh
+Announced: 2023-12-19
+Credits: Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk
+Affects: All supported versions of FreeBSD.
+Corrected: 2023-12-18 16:54:31 UTC (stable/14, 14.0-STABLE)
+ 2023-12-19 20:19:48 UTC (releng/14.0, 14.0-RELEASE-p4)
+ 2023-12-18 17:10:15 UTC (stable/13, 13.2-STABLE)
+ 2023-12-19 20:19:57 UTC (releng/13.2, 13.2-RELEASE-p9)
+CVE Name: CVE-2023-48795
+
+Note: While this issue does affect 12.4-STABLE and 12.4-RELEASE, the version
+of OpenSSH in 12.4 is old enough the vendor provided patch does not cleanly
+apply. As 12.4 goes out of support at the end of December and in order to
+quickly get fixes out for 14.0 and 13.2, the FreeBSD Security Team is issuing
+this advisory now while feasibility of a 12.4 backport is investigated. Users
+with 12.4 are encouraged to either implement the documented workaround or
+leverage an up to date version of OpenSSH from the ports/pkg collection.
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit <URL:https://security.FreeBSD.org/>.
+
+0. Revision History
+
+v1.0 2023-12-19 -- Initial release
+v1.1 2023-12-20 -- Corrected work around paths
+
+I. Background
+
+OpenSSH is an implementation of the SSH protocol suite, providing an
+encrypted and authenticated transport for a variety of services, including
+remote shell access.
+
+II. Problem Description
+
+The SSH protocol executes an initial handshake between the server and the
+client. This protocol handshake includes the possibility of several
+extensions allowing different options to be selected. Validation of the
+packets in the handshake is done through sequence numbers.
+
+III. Impact
+
+A man in the middle attacker can silently manipulate handshake messages to
+truncate extension negotiation messages potentially leading to less secure
+client authentication algorithms or deactivating keystroke timing attack
+countermeasures.
+
+IV. Workaround
+
+Add the following lines to /etc/ssh/ssh_config and /etc/ssh/sshd_config:
+ Ciphers -chacha20-poly1305@openssh.com
+ MACs -*etm@openssh.com
+
+V. Solution
+
+Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+Perform one of the following:
+
+1) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
+or the i386 platfrom on FreeBSD 13 and earlier, can be updated via
+the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+2) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-23:19/openssh.patch
+# fetch https://security.FreeBSD.org/patches/SA-23:19/openssh.patch.asc
+# gpg --verify openssh.patch.asc
+
+b) Apply the patch. Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
+
+Restart the applicable daemons, or reboot the system.
+
+VI. Correction details
+
+This issue is corrected as of the corresponding Git commit hash or Subversion
+revision number in the following stable and release branches:
+
+Branch/path Hash Revision
+- -------------------------------------------------------------------------
+stable/14/ 673d1ead65c9 stable/14-n266020
+releng/14.0/ b9856d61e99d releng/14.0-n265399
+stable/13/ 3bafcb9744c9 stable/13-n256910
+releng/13.2/ 69bd68ba30c0 releng/13.2-n254651
+- -------------------------------------------------------------------------
+
+Run the following command to see which files were modified by a
+particular commit:
+
+# git show --stat <commit hash>
+
+Or visit the following URL, replacing NNNNNN with the hash:
+
+<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
+
+To determine the commit count in a working tree (for comparison against
+nNNNNNN in the table above), run:
+
+# git rev-list --count --first-parent HEAD
+
+VII. References
+
+<URL:https://terrapin-attack.com/>
+
+<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795>
+
+The latest revision of this advisory is available at
+<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-23:19.openssh.asc>
+-----BEGIN PGP SIGNATURE-----
+
+iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmWCZcoACgkQbljekB8A
+Gu8fKA/9EzmQuXALYWjHoXAsizzgP1jw3sjN2sNqlggiAkTiN6pEQs8VlIroeTUn
+2hfktGHX9RQ85czE2VDHgP/HMA0cm84CIuF0g+m4cxzO8v1m+5bKd44jEJLjwO/P
+/LOmL3PYAfp6S1nHhgprq8Hw1GEKrlySLs+MYj3FwfdcqdTMuvrFsUDef7KQ7MVy
+lvj5oJQZitPQ4EGhGiHVobl6vWdU/xuroHlNtdEqExbOqOyVDH7daSfu7ipd20Y+
+2plRLjkscwlneLjdDe420cebYWxnvUamD09ppTiANaknjlCTf2Tclb6Wf8nAtxaA
+VsJosQSpI730fpxDn7S9ARHYOymwUf1ptQQd5q8Zj415+eVjJ7XGd96z6hx3B3Yt
+zJv7mwC22Cp9wqBMvAG9/z7kxZ5buhC25VR795SxnN/uwNqnH/OHxBV4oTEmf5Lk
+ytLqIekrPJqTiGgSGPkylXtfFaV0YJnkXGWeAduaoWEKwO8zaFEkMXypc7L5J9XT
+rSKMpPL2+vczKyQ534uzjGFLY5o0pI9EhQtDtxHkJ6olN3xfuBT/GkBkxe3JFxmE
+2pHvMplErDpprieNhICVey/polRzk7JIA+M1x7o2IZZVnlc1vsPIeXnOOMzY4+7z
+qeymU3QQf2pmIZpVL3dp26bnTB0oCRaJwEb5nuMfutIzTz4t1TY=
+=hvau
+-----END PGP SIGNATURE-----