-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: libssh security update
Advisory ID:       RHSA-2016:0566-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:0566.html
Issue date:        2016-03-31
CVE Names:         CVE-2016-0739 
====================================================================
1. Summary:

An update for libssh is now available for Red Hat Enterprise Linux 7
Extras.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux 7 Extras - x86_64

3. Description:

libssh is a library which implements the SSH protocol. It can be used to
implement client and server applications.

Security Fix(es):

* A type confusion issue was found in the way libssh generated ephemeral
secrets for the diffie-hellman-group1 and diffie-hellman-group14 key
exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use
significantly less secure random parameters. (CVE-2016-0739)

Red Hat would like to thank Aris Adamantiadis for reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing these updated packages, all running applications using
libssh must be restarted for this update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1305971 - CVE-2016-0739 libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length

6. Package List:

Red Hat Enterprise Linux 7 Extras:

Source:
libssh-0.7.1-2.el7.src.rpm

x86_64:
libssh-0.7.1-2.el7.x86_64.rpm
libssh-debuginfo-0.7.1-2.el7.x86_64.rpm
libssh-devel-0.7.1-2.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-0739
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFW/hpBXlSAg2UNWIIRAl7kAJ9+tkwVgOdO0H8HzJOXfK3fkuQP/wCfTjHw
ITqcXdwjt3h7seFx5vhHONs=GUeP
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

RedHat: RHSA-2016-0566:01 Moderate: libssh security update

An update for libssh is now available for Red Hat Enterprise Linux 7 Extras

Summary

libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* A type confusion issue was found in the way libssh generated ephemeral secrets for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use significantly less secure random parameters. (CVE-2016-0739)
Red Hat would like to thank Aris Adamantiadis for reporting this issue.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing these updated packages, all running applications using libssh must be restarted for this update to take effect.

References

https://access.redhat.com/security/cve/CVE-2016-0739 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux 7 Extras:
Source: libssh-0.7.1-2.el7.src.rpm
x86_64: libssh-0.7.1-2.el7.x86_64.rpm libssh-debuginfo-0.7.1-2.el7.x86_64.rpm libssh-devel-0.7.1-2.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2016:0566-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://access.redhat.com/errata/RHSA-2016:0566.html
Issued Date: : 2016-03-31
CVE Names: CVE-2016-0739

Topic

An update for libssh is now available for Red Hat Enterprise Linux 7Extras.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux 7 Extras - x86_64


Bugs Fixed

1305971 - CVE-2016-0739 libssh: bits/bytes confusion resulting in truncated Difffie-Hellman secret length


Related News