1
Candidate: CVE-2016-0787
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
5
https://www.libssh2.org/adv_20160223.html
7
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0
8
improperly truncates secrets to 128 or 256 bits, which makes it easier for
9
man-in-the-middle attackers to decrypt or intercept SSH sessions via
10
unspecified vectors, aka a "bits/bytes confusion bug."
13
sarnold> Debian noted there may be discussion of incomplete fix
15
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815662
16
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0787
18
Discovered-by: Andreas Schneider
22
upstream: https://github.com/libssh2/libssh2/commit/ca5222ea819cc5ed797860070b4c6c1aeeb28420
23
upstream: https://github.com/libssh2/libssh2/commit/7934c9ce2a029c43e3642a492d3b9e494d1542be
24
upstream_libssh2: released (1.7.0)
25
precise_libssh2: released (1.2.8-2ubuntu0.1)
26
trusty_libssh2: released (1.4.3-2ubuntu0.1)
27
vivid/stable-phone-overlay_libssh2: DNE
28
vivid/ubuntu-core_libssh2: DNE
29
wily_libssh2: ignored (reached end-of-life)
30
xenial_libssh2: released (1.5.0-2ubuntu0.1)
31
yakkety_libssh2: released (1.7.0-1ubuntu0.1)
32
devel_libssh2: released (1.7.0-1ubuntu1)