Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 3487-1] libssh2 security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 3487-1] libssh2 security update


Chronologisch Thread 
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 3487-1] libssh2 security update
  • Date: Tue, 23 Feb 2016 16:03:31 +0000
  • List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
  • List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-return-path: <carnil AT master.debian.org>
  • Priority: urgent
  • Resent-date: Tue, 23 Feb 2016 16:03:55 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <0fs37kYLm-K.A.UDD.rLIzWB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3487-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libssh2
CVE ID : CVE-2016-0787
Debian Bug : 815662

Andreas Schneider reported that libssh2, a SSH2 client-side library,
passes the number of bytes to a function that expects number of bits
during the SSHv2 handshake when libssh2 is to get a suitable value for
'group order' in the Diffie-Hellman negotiation. This weakens
significantly the handshake security, potentially allowing an
eavesdropper with enough resources to decrypt or intercept SSH sessions.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.2-1.1+deb7u2.

For the stable distribution (jessie), this problem has been fixed in
version 1.4.3-4.1+deb8u1.

We recommend that you upgrade your libssh2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJWzIHtAAoJEAVMuPMTQ89E0DYP/3LrsNApfqIrZMkMvb+4fsk2
PLLWiuNIoZaSfBzNgqGPbTA7Tss6k8a1jLp0+zRc3m17SwHjJ08vvtLgZAm6wqHK
2jeTsKK7oEDiaIEcZpzyAQ3LR9dKW1RyZTGsMFoTU93aD7DWu/lGEL6RlYVyuXkp
88MBMSZHy0z0WDS6psoPCuXFrtmagV5pfsJyYR1xxhj71S8nyZl5pcqd9kpvmhsY
OLxPhyioM0rJr31A96BTv+ZWrcjLXRPmMih7ZhjlU1pLgSKVtrQSClONo0tauVjG
uR78QdT4nJYdv3ys8Kz4rYB321Y8JRJd7JDYDXyOhMb0FPSYnhNV2HsZbYQonQBe
x+QJrf2Hvugyb5gG5l9Qds7u2ea5LYjYdP18Dm6+a57f+NYXJy0lyrXWdCUHSLbT
1Mu6NjUkQU22+naLZWUHtRedikFGxXphWimgV4mmdlr5GybxJqA/8yznNqpSscqh
Uo29LJzr5Ay6L6ekAVuwpx0TV4rH6wH2QJH7ng8VirJifrdNHVTsrbhcTB7ifkkQ
uytpAwdmY9mzWBDBmBH7J/aZRXCpKZcxNjIarUmx+UveDS4paSB6mfMXSjX0PXfa
ZaGpSsLvt04AeAAO6ab6D2lxDvGTgXkX/qdStYQR8xE+cjU0XVLxnR9GK/RLYbow
zR/1hkxj/Ns+GNohLoYw
=6/3s
-----END PGP SIGNATURE-----




  • [IT-SecNots] [SECURITY] [DSA 3487-1] libssh2 security update, Salvatore Bonaccorso, 23.02.2016

Archiv bereitgestellt durch MHonArc 2.6.19.

Seitenanfang