MGASA-2016-0082

Source
https://advisories.mageia.org/MGASA-2016-0082.html
Import Source
https://advisories.mageia.org/MGASA-2016-0082.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0082
Related
Published
2016-02-24T17:06:40Z
Modified
2016-02-24T17:01:39Z
Summary
Updated libssh packages fix CVE-2016-0739
Details

Updated libssh packages fix security vulnerability:

libssh versions 0.1 and above have a bits/bytes confusion bug and generate an abnormally short ephemeral secret for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. The resulting secret is 128 bits long, instead of the recommended sizes of 1024 and 2048 bits respectively. Both client and server are are vulnerable, pre-authentication. This vulnerability could be exploited by an eavesdropper with enough resources to decrypt or intercept SSH sessions (CVE-2016-0739).

References
Credits

Affected packages

Mageia:5 / libssh

Package

Name
libssh
Purl
pkg:rpm/mageia/libssh?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.5-1.1.mga5

Ecosystem specific

{
    "section": "core"
}