Debian 10225 Published by

The following updates has been released for Debian:

[DLA 425-1] libssh security update
[DLA 426-1] libssh2 security update
[DSA 3487-1] libssh2 security update
[DSA 3488-1] libssh security update
[DSA 3489-1] lighttpd security update



[DLA 425-1] libssh security update

Package        : libssh
Version        : 0.4.5-3+squeeze3
CVE ID         : CVE-2016-0739

Aris Adamantiadis of the libssh team discovered that libssh, an SSH2
protocol implementation used by many applications, did not generate
sufficiently long Diffie-Hellman secrets.

This vulnerability could be exploited by an eavesdropper to decrypt
and to intercept SSH sessions.

For the oldoldstable distribution (squeeze), this has been fixed in
version 0.4.5-3+squeeze3.

For the oldstable (wheezy) and stable (jessie) distributions, this
will be fixed soon.

[DLA 426-1] libssh2 security update

Package        : libssh2
Version        : 1.2.6-1+deb6u2
CVE ID         : CVE-2016-0787

Andreas Schneider reported that libssh2, an SSH2 protocol
implementation used by many applications, did not generate
sufficiently long Diffie-Hellman secrets.

This vulnerability could be exploited by an eavesdropper to decrypt
and to intercept SSH sessions.

For the oldoldstable distribution (squeeze), this has been fixed in
version 1.2.6-1+deb6u2.  Although the changelog refers to 'sha256',
this version only supports DH SHA-1 key exchange and it is that key
exchange method that has been fixed.

For the oldstable (wheezy) and stable (jessie) distributions, this
will be fixed soon.

[DSA 3487-1] libssh2 security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3487-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libssh2
CVE ID : CVE-2016-0787
Debian Bug : 815662

Andreas Schneider reported that libssh2, a SSH2 client-side library,
passes the number of bytes to a function that expects number of bits
during the SSHv2 handshake when libssh2 is to get a suitable value for
'group order' in the Diffie-Hellman negotiation. This weakens
significantly the handshake security, potentially allowing an
eavesdropper with enough resources to decrypt or intercept SSH sessions.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.2-1.1+deb7u2.

For the stable distribution (jessie), this problem has been fixed in
version 1.4.3-4.1+deb8u1.

We recommend that you upgrade your libssh2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3488-1] libssh security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3488-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
February 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libssh
CVE ID : CVE-2016-0739
Debian Bug : 815663

Aris Adamantiadis discovered that libssh, a tiny C SSH library,
incorrectly generated a short ephemeral secret for the
diffie-hellman-group1 and diffie-hellman-group14 key exchange methods.
The resulting secret is 128 bits long, instead of the recommended sizes
of 1024 and 2048 bits respectively. This flaw could allow an
eavesdropper with enough resources to decrypt or intercept SSH sessions.

For the oldstable distribution (wheezy), this problem has been fixed in
version 0.5.4-1+deb7u3. This update also includes fixes for
CVE-2014-8132 and CVE-2015-3146, which were previously scheduled for the
next wheezy point release.

For the stable distribution (jessie), this problem has been fixed in
version 0.6.3-4+deb8u2.

We recommend that you upgrade your libssh packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

[DSA 3489-1] lighttpd security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3489-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
February 23, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : lighttpd
CVE ID : CVE-2014-3566
Debian Bug : 765702

lighttpd, a small webserver, is vulnerable to the POODLE attack via
the use of SSLv3. This protocol is now disabled by default.

For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.31-4+deb7u4.

We recommend that you upgrade your lighttpd packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/