object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(10921)
    ["cve_code"]=>
    string(14) "CVE-2023-48795"
    ["cnnvd"]=>
    string(17) "CNNVD-202312-1668"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(5.9)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(1981) "带有某些 OpenSSH 扩展的 SSH 传输协议(在 OpenSSH 9.6 之前的版本和其他产品中发现)允许远程攻击者绕过完整性检查,从而省略某些数据包(从扩展协商消息中),因此客户端和服务器可能最终建立一些安全功能已降级或禁用的连接,也称为 Terrapin 攻击。发生这种情况的原因是,这些扩展实现的 SSH 二进制数据包协议 (BPP) 错误处理了握手阶段并错误处理了序列号的使用。例如,有一种针对 SSH 使用 ChaCha20-Poly1305(以及使用 Encrypt-then-MAC 的 CBC)的有效攻击。绕过发生在 
chacha20-poly1305@openssh.com
 和(如果使用 CBC)
-etm@openssh.com
 MAC 算法中。这也会影响 3.1.0-SNAPSHOT 之前的 Maverick Synergy Java SSH API、2022.83 之前的 Dropbear、Erlang/OTP 中 5.1.1 之前的 Ssh、0.80 之前的 PuTTY、2.14.2 之前的 AsyncSSH、0.17.0 之前的 
golang.org/x/crypto
、0.10.6 之前的 libssh、1.11.0 之前的 libssh2、3.4.6 之前的 Thorn Tech SFTP Gateway、5.1 之前的 Tera Term、3.4.0 之前的 Paramiko、0.2.15 之前的 jsch、2.5.6 之前的 SFTPGo、23.09.1 之前的 Netgate pfSense Plus、2.7.2 之前的 Netgate pfSense CE、18.2.0 之前的 HPN-SSH、1.3.8b 之前的 ProFTPD(和 1.3.9rc2 之前)和 ORYX CycloneSSH 2.3.4 之前、NetSarang XShell 7 Build 0144 之前、CrushFTP 10.6.0 之前、ConnectBot SSH 库 2.2.22 之前、Apache MINA sshd 至 2.11.0、sshj 至 0.37.0、TinySSH 至 20230101、trilead-ssh2 6401、LANCOM LCOS 和 LANconfig、FileZilla 3.66.4 之前、Nova 11.8 之前、PKIX-SSH 14.4 之前、SecureCRT 9.4.3 之前、Transmit5 5.10.4 之前、Win32-OpenSSH 9.5.0.0p1-Beta 之前、WinSCP 6.2.2 之前、Bitvise SSH Server 9.32 之前、Bitvise SSH Client 9.33 之前、KiTTY 至0.76.1.13、Ruby 的 net-ssh gem 7.2.0、Node.js 的 1.15.0 之前的 mscdex ssh2 模块、Rust 的 0.35.1 之前的 thrussh 库以及 Rust 的 0.40.2 之前的 Russh 板条箱。
"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(6) "libssh"
    ["repair_version"]=>
    NULL
    ["repair"]=>
    string(51) "软件包升级
rpm -ivh libssh-0.9.4-5.rf01.zkhq8
"
    ["prove"]=>
    NULL
    ["patch"]=>
    string(122) "厂商补丁:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://www.openssh.com/openbsd.html"
    ["references"]=>
    array(118) {
      [0]=>
      string(63) "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html"
      [1]=>
      string(40) "https://matt.ucc.asn.au/dropbear/CHANGES"
      [2]=>
      string(36) "https://www.openssh.com/openbsd.html"
      [3]=>
      string(58) "https://github.com/openssh/openssh-portable/commits/master"
      [4]=>
      string(57) "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ"
      [5]=>
      string(50) "https://www.bitvise.com/ssh-server-version-history"
      [6]=>
      string(37) "https://github.com/ronf/asyncssh/tags"
      [7]=>
      string(46) "https://gitlab.com/libssh/libssh-mirror/-/tags"
      [8]=>
      string(98) "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/"
      [9]=>
      string(109) "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42"
      [10]=>
      string(39) "https://www.openssh.com/txt/release-9.6"
      [11]=>
      string(105) "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/"
      [12]=>
      string(31) "https://www.terrapin-attack.com"
      [13]=>
      string(89) "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25"
      [14]=>
      string(62) "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst"
      [15]=>
      string(54) "https://thorntech.com/cve-2023-48795-and-sftp-gateway/"
      [16]=>
      string(55) "https://github.com/warp-tech/russh/releases/tag/v0.40.2"
      [17]=>
      string(91) "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0"
      [18]=>
      string(56) "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      [19]=>
      string(59) "https://twitter.com/TrueSkrillor/status/1736774389725565005"
      [20]=>
      string(80) "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d"
      [21]=>
      string(48) "https://github.com/paramiko/paramiko/issues/2337"
      [22]=>
      string(57) "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg"
      [23]=>
      string(45) "https://news.ycombinator.com/item?id=38684904"
      [24]=>
      string(45) "https://news.ycombinator.com/item?id=38685286"
      [25]=>
      string(55) "http://www.openwall.com/lists/oss-security/2023/12/18/3"
      [26]=>
      string(41) "https://github.com/mwiede/jsch/issues/457"
      [27]=>
      string(108) "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6"
      [28]=>
      string(53) "https://github.com/erlang/otp/releases/tag/OTP-26.2.1"
      [29]=>
      string(49) "https://github.com/advisories/GHSA-45x7-px36-x8w8"
      [30]=>
      string(66) "https://security-tracker.debian.org/tracker/source-package/libssh2"
      [31]=>
      string(71) "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg"
      [32]=>
      string(58) "https://security-tracker.debian.org/tracker/CVE-2023-48795"
      [33]=>
      string(49) "https://bugzilla.suse.com/show_bug.cgi?id=1217950"
      [34]=>
      string(51) "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
      [35]=>
      string(30) "https://bugs.gentoo.org/920280"
      [36]=>
      string(42) "https://ubuntu.com/security/CVE-2023-48795"
      [37]=>
      string(93) "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/"
      [38]=>
      string(53) "https://access.redhat.com/security/cve/cve-2023-48795"
      [39]=>
      string(39) "https://github.com/mwiede/jsch/pull/461"
      [40]=>
      string(53) "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6"
      [41]=>
      string(44) "https://github.com/libssh2/libssh2/pull/1291"
      [42]=>
      string(58) "https://forum.netgate.com/topic/184941/terrapin-ssh-attack"
      [43]=>
      string(83) "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5"
      [44]=>
      string(43) "https://github.com/rapier1/hpn-ssh/releases"
      [45]=>
      string(60) "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES"
      [46]=>
      string(51) "https://www.netsarang.com/en/xshell-update-history/"
      [47]=>
      string(39) "https://www.paramiko.org/changelog.html"
      [48]=>
      string(45) "https://github.com/proftpd/proftpd/issues/456"
      [49]=>
      string(61) "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1"
      [50]=>
      string(64) "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15"
      [51]=>
      string(45) "https://oryx-embedded.com/download/#changelog"
      [52]=>
      string(57) "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update"
      [53]=>
      string(60) "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22"
      [54]=>
      string(84) "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab"
      [55]=>
      string(78) "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3"
      [56]=>
      string(98) "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC"
      [57]=>
      string(41) "https://crates.io/crates/thrussh/versions"
      [58]=>
      string(44) "https://github.com/NixOS/nixpkgs/pull/275249"
      [59]=>
      string(55) "http://www.openwall.com/lists/oss-security/2023/12/19/5"
      [60]=>
      string(72) "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc"
      [61]=>
      string(116) "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/"
      [62]=>
      string(55) "http://www.openwall.com/lists/oss-security/2023/12/20/3"
      [63]=>
      string(94) "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES"
      [64]=>
      string(94) "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES"
      [65]=>
      string(46) "https://github.com/apache/mina-sshd/issues/445"
      [66]=>
      string(45) "https://github.com/hierynomus/sshj/issues/916"
      [67]=>
      string(46) "https://github.com/janmojzis/tinyssh/issues/81"
      [68]=>
      string(56) "https://www.openwall.com/lists/oss-security/2023/12/20/3"
      [69]=>
      string(71) "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2"
      [70]=>
      string(100) "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16"
      [71]=>
      string(82) "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html"
      [72]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/"
      [73]=>
      string(45) "https://www.debian.org/security/2023/dsa-5586"
      [74]=>
      string(84) "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508"
      [75]=>
      string(58) "https://www.theregister.com/2023/12/20/terrapin_attack_ssh"
      [76]=>
      string(42) "https://filezilla-project.org/versions.php"
      [77]=>
      string(32) "https://nova.app/releases/#v11.8"
      [78]=>
      string(45) "https://roumenpetrov.info/secsh/#news20231220"
      [79]=>
      string(54) "https://www.vandyke.com/products/securecrt/history.txt"
      [80]=>
      string(46) "https://help.panic.com/releasenotes/transmit5/"
      [81]=>
      string(72) "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta"
      [82]=>
      string(55) "https://github.com/PowerShell/Win32-OpenSSH/issues/2189"
      [83]=>
      string(41) "https://winscp.net/eng/docs/history#6.2.2"
      [84]=>
      string(54) "https://www.bitvise.com/ssh-client-version-history#933"
      [85]=>
      string(41) "https://github.com/cyd01/KiTTY/issues/520"
      [86]=>
      string(45) "https://www.debian.org/security/2023/dsa-5588"
      [87]=>
      string(47) "https://github.com/ssh-mitm/ssh-mitm/issues/165"
      [88]=>
      string(45) "https://news.ycombinator.com/item?id=38732005"
      [89]=>
      string(66) "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html"
      [90]=>
      string(42) "https://security.gentoo.org/glsa/202312-16"
      [91]=>
      string(42) "https://security.gentoo.org/glsa/202312-17"
      [92]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/"
      [93]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/"
      [94]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/"
      [95]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/"
      [96]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/"
      [97]=>
      string(56) "https://security.netapp.com/advisory/ntap-20240105-0004/"
      [98]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/"
      [99]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/"
      [100]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/"
      [101]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/"
      [102]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/"
      [103]=>
      string(63) "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002"
      [104]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
      [105]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/"
      [106]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
      [107]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/"
      [108]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/"
      [109]=>
      string(66) "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html"
      [110]=>
      string(66) "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html"
      [111]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/"
      [112]=>
      string(130) "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/"
      [113]=>
      string(37) "https://support.apple.com/kb/HT214084"
      [114]=>
      string(46) "http://seclists.org/fulldisclosure/2024/Mar/21"
      [115]=>
      string(66) "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
      [116]=>
      string(55) "http://www.openwall.com/lists/oss-security/2024/04/17/8"
      [117]=>
      string(55) "http://www.openwall.com/lists/oss-security/2024/03/06/3"
    }
    ["createtime"]=>
    int(1720683104)
    ["updatetime"]=>
    int(1720683104)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    string(36) "OpenSSH 安全漏洞(CVE-2023-48795)"
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-09-19"
    ["cve_name"]=>
    string(20) "OpenSSH 安全漏洞"
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(10921)
    ["cve_code"]=>
    string(14) "CVE-2023-48795"
    ["cnnvd"]=>
    string(17) "CNNVD-202312-1668"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(5.9)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(1981) "带有某些 OpenSSH 扩展的 SSH 传输协议(在 OpenSSH 9.6 之前的版本和其他产品中发现)允许远程攻击者绕过完整性检查,从而省略某些数据包(从扩展协商消息中),因此客户端和服务器可能最终建立一些安全功能已降级或禁用的连接,也称为 Terrapin 攻击。发生这种情况的原因是,这些扩展实现的 SSH 二进制数据包协议 (BPP) 错误处理了握手阶段并错误处理了序列号的使用。例如,有一种针对 SSH 使用 ChaCha20-Poly1305(以及使用 Encrypt-then-MAC 的 CBC)的有效攻击。绕过发生在 
chacha20-poly1305@openssh.com
 和(如果使用 CBC)
-etm@openssh.com
 MAC 算法中。这也会影响 3.1.0-SNAPSHOT 之前的 Maverick Synergy Java SSH API、2022.83 之前的 Dropbear、Erlang/OTP 中 5.1.1 之前的 Ssh、0.80 之前的 PuTTY、2.14.2 之前的 AsyncSSH、0.17.0 之前的 
golang.org/x/crypto
、0.10.6 之前的 libssh、1.11.0 之前的 libssh2、3.4.6 之前的 Thorn Tech SFTP Gateway、5.1 之前的 Tera Term、3.4.0 之前的 Paramiko、0.2.15 之前的 jsch、2.5.6 之前的 SFTPGo、23.09.1 之前的 Netgate pfSense Plus、2.7.2 之前的 Netgate pfSense CE、18.2.0 之前的 HPN-SSH、1.3.8b 之前的 ProFTPD(和 1.3.9rc2 之前)和 ORYX CycloneSSH 2.3.4 之前、NetSarang XShell 7 Build 0144 之前、CrushFTP 10.6.0 之前、ConnectBot SSH 库 2.2.22 之前、Apache MINA sshd 至 2.11.0、sshj 至 0.37.0、TinySSH 至 20230101、trilead-ssh2 6401、LANCOM LCOS 和 LANconfig、FileZilla 3.66.4 之前、Nova 11.8 之前、PKIX-SSH 14.4 之前、SecureCRT 9.4.3 之前、Transmit5 5.10.4 之前、Win32-OpenSSH 9.5.0.0p1-Beta 之前、WinSCP 6.2.2 之前、Bitvise SSH Server 9.32 之前、Bitvise SSH Client 9.33 之前、KiTTY 至0.76.1.13、Ruby 的 net-ssh gem 7.2.0、Node.js 的 1.15.0 之前的 mscdex ssh2 模块、Rust 的 0.35.1 之前的 thrussh 库以及 Rust 的 0.40.2 之前的 Russh 板条箱。
"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(6) "libssh"
    ["repair_version"]=>
    NULL
    ["repair"]=>
    string(51) "软件包升级
rpm -ivh libssh-0.9.4-5.rf01.zkhq8
"
    ["prove"]=>
    NULL
    ["patch"]=>
    string(122) "厂商补丁:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://www.openssh.com/openbsd.html"
    ["references"]=>
    string(8331) "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html;https://matt.ucc.asn.au/dropbear/CHANGES;https://www.openssh.com/openbsd.html;https://github.com/openssh/openssh-portable/commits/master;https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ;https://www.bitvise.com/ssh-server-version-history;https://github.com/ronf/asyncssh/tags;https://gitlab.com/libssh/libssh-mirror/-/tags;https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/;https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42;https://www.openssh.com/txt/release-9.6;https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/;https://www.terrapin-attack.com;https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25;https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst;https://thorntech.com/cve-2023-48795-and-sftp-gateway/;https://github.com/warp-tech/russh/releases/tag/v0.40.2;https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0;https://www.openwall.com/lists/oss-security/2023/12/18/2;https://twitter.com/TrueSkrillor/status/1736774389725565005;https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d;https://github.com/paramiko/paramiko/issues/2337;https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg;https://news.ycombinator.com/item?id=38684904;https://news.ycombinator.com/item?id=38685286;http://www.openwall.com/lists/oss-security/2023/12/18/3;https://github.com/mwiede/jsch/issues/457;https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6;https://github.com/erlang/otp/releases/tag/OTP-26.2.1;https://github.com/advisories/GHSA-45x7-px36-x8w8;https://security-tracker.debian.org/tracker/source-package/libssh2;https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg;https://security-tracker.debian.org/tracker/CVE-2023-48795;https://bugzilla.suse.com/show_bug.cgi?id=1217950;https://bugzilla.redhat.com/show_bug.cgi?id=2254210;https://bugs.gentoo.org/920280;https://ubuntu.com/security/CVE-2023-48795;https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/;https://access.redhat.com/security/cve/cve-2023-48795;https://github.com/mwiede/jsch/pull/461;https://github.com/drakkan/sftpgo/releases/tag/v2.5.6;https://github.com/libssh2/libssh2/pull/1291;https://forum.netgate.com/topic/184941/terrapin-ssh-attack;https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5;https://github.com/rapier1/hpn-ssh/releases;https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES;https://www.netsarang.com/en/xshell-update-history/;https://www.paramiko.org/changelog.html;https://github.com/proftpd/proftpd/issues/456;https://github.com/TeraTermProject/teraterm/releases/tag/v5.1;https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15;https://oryx-embedded.com/download/#changelog;https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update;https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22;https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab;https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3;https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC;https://crates.io/crates/thrussh/versions;https://github.com/NixOS/nixpkgs/pull/275249;http://www.openwall.com/lists/oss-security/2023/12/19/5;https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc;https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/;http://www.openwall.com/lists/oss-security/2023/12/20/3;https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES;https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES;https://github.com/apache/mina-sshd/issues/445;https://github.com/hierynomus/sshj/issues/916;https://github.com/janmojzis/tinyssh/issues/81;https://www.openwall.com/lists/oss-security/2023/12/20/3;https://security-tracker.debian.org/tracker/source-package/trilead-ssh2;https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16;http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/;https://www.debian.org/security/2023/dsa-5586;https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508;https://www.theregister.com/2023/12/20/terrapin_attack_ssh;https://filezilla-project.org/versions.php;https://nova.app/releases/#v11.8;https://roumenpetrov.info/secsh/#news20231220;https://www.vandyke.com/products/securecrt/history.txt;https://help.panic.com/releasenotes/transmit5/;https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta;https://github.com/PowerShell/Win32-OpenSSH/issues/2189;https://winscp.net/eng/docs/history#6.2.2;https://www.bitvise.com/ssh-client-version-history#933;https://github.com/cyd01/KiTTY/issues/520;https://www.debian.org/security/2023/dsa-5588;https://github.com/ssh-mitm/ssh-mitm/issues/165;https://news.ycombinator.com/item?id=38732005;https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html;https://security.gentoo.org/glsa/202312-16;https://security.gentoo.org/glsa/202312-17;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/;https://security.netapp.com/advisory/ntap-20240105-0004/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/;https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/;https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html;https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/;https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/;https://support.apple.com/kb/HT214084;http://seclists.org/fulldisclosure/2024/Mar/21;https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html;http://www.openwall.com/lists/oss-security/2024/04/17/8;http://www.openwall.com/lists/oss-security/2024/03/06/3"
    ["createtime"]=>
    int(1720683104)
    ["updatetime"]=>
    int(1720683104)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    string(36) "OpenSSH 安全漏洞(CVE-2023-48795)"
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-09-19"
    ["cve_name"]=>
    string(20) "OpenSSH 安全漏洞"
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(5) "10921"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}