CVE-2023-28113: russh may use insecure Diffie-Hellman keys
Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality.
References
- github.com/advisories/GHSA-cqvm-j2r2-hwpg
- github.com/warp-tech/russh
- github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs
- github.com/warp-tech/russh/blob/master/russh/src/kex/dh/groups.rs
- github.com/warp-tech/russh/commit/45d2d82930bf4a675bd57abfafec8fe4065befcd
- github.com/warp-tech/russh/commit/d831a3716d3719dc76f091fcea9d94bd4ef97c6e
- github.com/warp-tech/russh/releases/tag/v0.36.2
- github.com/warp-tech/russh/releases/tag/v0.37.1
- github.com/warp-tech/russh/security/advisories/GHSA-cqvm-j2r2-hwpg
- nvd.nist.gov/vuln/detail/CVE-2023-28113
Detect and mitigate CVE-2023-28113 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →