Debdiff for Yakkety

The vuln has no specific known attack methods so there is no public
exploit available. Package tests have passed and I used a somewhat
unusual method to explicitly regression test. Package php-ssh2 depends
on libssh2.

<?php

$server="ssh.host.name";

// DH Group1 SHA1 uses patched sha1 KEX

$methods = array(
    'kex' => 'diffie-hellman-group1-sha1'
);

// Make our connection
$connection = ssh2_connect($server, 22, $methods);

if (!$connection) die('Connection failed');

$methods_neg = ssh2_methods_negotiated($connection);
echo "Keys negotiated with: {$methods_neg['kex']}\n";
echo "Client-to-server uses these methods:\n";
echo " Encryption: {$methods_neg["client_to_server"]["crypt"]}\n";
echo " Compression: {$methods_neg["client_to_server"]["comp"]}\n";
echo "Server-to-client uses these methods:\n";
echo " Encryption: {$methods_neg["server_to_client"]["crypt"]}\n";
echo " Compression: {$methods_neg["server_to_client"]["comp"]}\n";

** Patch added: "Debdiff for yakkety"
   
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+attachment/4819153/+files/libssh2_1.7.0-1ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1664812

Title:
  CVE-2016-0787

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libssh2/+bug/1664812/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to