Hi Steve,

On Fri, 2020-11-13 at 04:52 -1000, Steve Sakoman wrote:
> From: Alexander Kanavin <alex.kana...@gmail.com>
> 
> CVE-2020-14145
> 
> The client side in OpenSSH 5.7 through 8.3 has an Observable
> Discrepancy leading to an information leak in the algorithm
> negotiation. This allows man-in-the-middle attackers to target
> initial connection attempts (where no host key for the server
> has been cached by the client).

I am not sure if this CVE should be considered fixed. Please see
Section 3.1:

https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf

Also, this isn't a bug fix release and has potentially incompatible
changes that may affect existing configurations as per the release
notes:

https://www.openssh.com/txt/release-8.4

Thanks,

Anuj

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#144570): 
https://lists.openembedded.org/g/openembedded-core/message/144570
Mute This Topic: https://lists.openembedded.org/mt/78230616/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to