Weak host-keys are not replaced during openssh update

NoOp glgxg at sbcglobal.net
Tue May 13 19:48:07 UTC 2008


On 05/13/2008 11:49 AM, Mario Vukelic wrote:
> On Tue, 2008-05-13 at 20:35 +0200, Markus Schönhaber wrote:
>> On two of the Gutsy servers I administer the weak host keys remain in
>> place after
>> aptitude update
>> aptitude safe-upgrade
>> and I am not prompted anything during the upgrade either.
>> 
>> Anyone else seeing this?
> 
> Maybe this:
> 
> =========================================================== 
> Ubuntu Security Notice USN-612-2               May 13, 2008
> openssh vulnerability
> CVE-2008-0166, http://www.ubuntu.com/usn/usn-612-1
> ===========================================================
> 
> <snip>
> 
>    "Once the update is applied, weak user keys will be automatically
>    rejected where possible (though they cannot be detected in all
>    cases). If you are using such keys for user authentication,
>    they will immediately stop working and will need to be replaced
>    (see step 3)."
> 
> 
> 
> 

Probably worth posting:

http://www.ubuntu.com/usn/

#
USN-612-3: OpenVPN vulnerability
CVE-2008-0166
#
USN-612-2: OpenSSH vulnerability
CVE-2008-0166
#
USN-612-1: OpenSSL vulnerability
CVE-2008-0166

$ sudo ssh-vulnkey -a

checks all keys on the system.





More information about the ubuntu-users mailing list