drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in libssh2
Name: |
Preisgabe von Informationen in libssh2 |
|
ID: |
DSA-3487-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian wheezy, Debian jessie |
|
Datum: |
Di, 23. Februar 2016, 22:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787 |
|
Applikationen: |
libssh2 |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3487-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 23, 2016 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : libssh2 CVE ID : CVE-2016-0787 Debian Bug : 815662
Andreas Schneider reported that libssh2, a SSH2 client-side library, passes the number of bytes to a function that expects number of bits during the SSHv2 handshake when libssh2 is to get a suitable value for 'group order' in the Diffie-Hellman negotiation. This weakens significantly the handshake security, potentially allowing an eavesdropper with enough resources to decrypt or intercept SSH sessions.
For the oldstable distribution (wheezy), this problem has been fixed in version 1.4.2-1.1+deb7u2.
For the stable distribution (jessie), this problem has been fixed in version 1.4.3-4.1+deb8u1.
We recommend that you upgrade your libssh2 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJWzIHtAAoJEAVMuPMTQ89E0DYP/3LrsNApfqIrZMkMvb+4fsk2 PLLWiuNIoZaSfBzNgqGPbTA7Tss6k8a1jLp0+zRc3m17SwHjJ08vvtLgZAm6wqHK 2jeTsKK7oEDiaIEcZpzyAQ3LR9dKW1RyZTGsMFoTU93aD7DWu/lGEL6RlYVyuXkp 88MBMSZHy0z0WDS6psoPCuXFrtmagV5pfsJyYR1xxhj71S8nyZl5pcqd9kpvmhsY OLxPhyioM0rJr31A96BTv+ZWrcjLXRPmMih7ZhjlU1pLgSKVtrQSClONo0tauVjG uR78QdT4nJYdv3ys8Kz4rYB321Y8JRJd7JDYDXyOhMb0FPSYnhNV2HsZbYQonQBe x+QJrf2Hvugyb5gG5l9Qds7u2ea5LYjYdP18Dm6+a57f+NYXJy0lyrXWdCUHSLbT 1Mu6NjUkQU22+naLZWUHtRedikFGxXphWimgV4mmdlr5GybxJqA/8yznNqpSscqh Uo29LJzr5Ay6L6ekAVuwpx0TV4rH6wH2QJH7ng8VirJifrdNHVTsrbhcTB7ifkkQ uytpAwdmY9mzWBDBmBH7J/aZRXCpKZcxNjIarUmx+UveDS4paSB6mfMXSjX0PXfa ZaGpSsLvt04AeAAO6ab6D2lxDvGTgXkX/qdStYQR8xE+cjU0XVLxnR9GK/RLYbow zR/1hkxj/Ns+GNohLoYw =6/3s -----END PGP SIGNATURE-----
|
|
|
|