During the SSHv2 handshake when libssh2 is to get a suitable value for 'group order' in the Diffle Hellman negotiation, it would pass in number of bytes to a function that expected number of bits. This would result in the library generating numbers using only an 8th the number of random bits than what were intended: 128 or 256 bits instead of 1023 or 2047
Using such drastically reduced amount of random bits for Diffie Hellman weakened the handshake security significantly.
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2016-0787 to this issue.
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2016-215a2219b1
Please login to add feedback.
This update has been submitted for testing by pghmcfc.
This update has been pushed to testing.
works for me
pghmcfc edited this update.
Works great! LGTM =)
This update has been submitted for stable by bodhi.
Works for me.
This update has been pushed to stable.