~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2016-0787

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2016-0787
2
 
PublicDate: 2016-04-13
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
5
 
 https://www.libssh2.org/adv_20160223.html
6
 
Description:
7
 
 The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0
8
 
 improperly truncates secrets to 128 or 256 bits, which makes it easier for
9
 
 man-in-the-middle attackers to decrypt or intercept SSH sessions via
10
 
 unspecified vectors, aka a "bits/bytes confusion bug."
11
 
Ubuntu-Description:
12
 
Notes:
13
 
 sarnold> Debian noted there may be discussion of incomplete fix
14
 
Bugs:
15
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815662
16
 
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0787
17
 
Priority: medium
18
 
Discovered-by: Andreas Schneider
19
 
Assigned-to:
20
 
 
21
 
Patches_libssh2:
22
 
 upstream: https://github.com/libssh2/libssh2/commit/ca5222ea819cc5ed797860070b4c6c1aeeb28420
23
 
 upstream: https://github.com/libssh2/libssh2/commit/7934c9ce2a029c43e3642a492d3b9e494d1542be
24
 
upstream_libssh2: released (1.7.0)
25
 
precise_libssh2: released (1.2.8-2ubuntu0.1)
26
 
trusty_libssh2: released (1.4.3-2ubuntu0.1)
27
 
vivid/stable-phone-overlay_libssh2: DNE
28
 
vivid/ubuntu-core_libssh2: DNE
29
 
wily_libssh2: ignored (reached end-of-life)
30
 
xenial_libssh2: released (1.5.0-2ubuntu0.1)
31
 
yakkety_libssh2: released (1.7.0-1ubuntu0.1)
32
 
devel_libssh2: released (1.7.0-1ubuntu1)