USN-612-7: OpenSSH update


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) USN-612-7: OpenSSH update
# 1  
Old 05-20-2008
USN-612-7: OpenSSH update

Referenced CVEs:
CVE-2008-0166


Description:
=========================================================== Ubuntu Security Notice USN-612-7 May 20, 2008 openssh update CVE-2008-0166 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: openssh-server 1:4.2p1-7ubuntu3.4 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: USN-612-2 introduced protections for OpenSSH, related to the OpenSSL vulnerabilities addressed by USN-612-1. This update provides the corresponding updates for OpenSSH in Ubuntu 6.06 LTS. While the OpenSSL in Ubuntu 6.06 is not vulnerable, this update will block weak keys generated on systems that may have been affected themselves. Original advisory details: A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and SSL certificates.





More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
UPDATE-INITRAMFS(8)					      update-initramfs manual					       UPDATE-INITRAMFS(8)

NAME
update-initramfs - generate an initramfs image SYNOPSIS
update-initramfs -c|-d|-u [-k version] [-t] [-v] [-b] [-h] DESCRIPTION
The update-initramfs script manages your initramfs images on your local box. It keeps track of the existing initramfs archives in /boot. There are three modes of operation create, update or delete. You must at least specify one of those modes. The initramfs is a gzipped cpio archive. At boot time, the kernel unpacks that archive into RAM disk, mounts and uses it as initial root file system. All finding of the root device happens in this early userspace. OPTIONS
-k version Set the specific kernel version for whom the initramfs will be generated. For example the output of uname -r for your currently running kernel. This argument is optional for update. The default is the latest kernel version. The use of "all" for the version string specifies update-initramfs to execute the chosen action for all kernel versions, that are already known to update-initramfs. -c This mode creates a new initramfs. -u This mode updates an existing initramfs. -d This mode removes an existing initramfs. -t Allows one to take over an custom initramfs with a newer one. -v This option increases the amount of information you are given during the chosen action. -b Set an different bootdir for the image creation. -h Print a short help page describing the available options in update-initramfs. EXAMPLES
Update the initramfs of the newest kernel: update-initramfs -u Create the initramfs for a specific kernel: update-initramfs -c -k 2.6.18-1-686 FILES
/etc/initramfs-tools/update-initramfs.conf AUTHOR
The initramfs-tools are written by Maximilian Attems <maks@debian.org>, Jeff Bailey <jbailey@raspberryginger.com> and numerous others. SEE ALSO
initramfs.conf(5), initramfs-tools(8), mkinitramfs(8). Linux 2008/12/19 UPDATE-INITRAMFS(8)