Comment 1 for bug 1664812

Revision history for this message
Brian Morton (rokclimb15) wrote :

Debdiff for Yakkety

The vuln has no specific known attack methods so there is no public exploit available. Package tests have passed and I used a somewhat unusual method to explicitly regression test. Package php-ssh2 depends on libssh2.

<?php

$server="ssh.host.name";

// DH Group1 SHA1 uses patched sha1 KEX

$methods = array(
    'kex' => 'diffie-hellman-group1-sha1'
);

// Make our connection
$connection = ssh2_connect($server, 22, $methods);

if (!$connection) die('Connection failed');

$methods_neg = ssh2_methods_negotiated($connection);
echo "Keys negotiated with: {$methods_neg['kex']}\n";
echo "Client-to-server uses these methods:\n";
echo " Encryption: {$methods_neg["client_to_server"]["crypt"]}\n";
echo " Compression: {$methods_neg["client_to_server"]["comp"]}\n";
echo "Server-to-client uses these methods:\n";
echo " Encryption: {$methods_neg["server_to_client"]["crypt"]}\n";
echo " Compression: {$methods_neg["server_to_client"]["comp"]}\n";