AW: [SECURITY] [DSA 1576-1] New openssh packages fix predictable randomness
Hi,
you only need to do
aptitude install openssh-server
or
apt-get install openssh-server
Best regards
Tony Wolf
-----Ursprüngliche Nachricht-----
Von: Alvise Belotti [mailto:alvise@lettere.unipd.it]
Gesendet: Mittwoch, 14. Mai 2008 12:20
An: José Santos
Cc: debian-security@lists.debian.org
Betreff: Re: [SECURITY] [DSA 1576-1] New openssh packages fix predictable randomness
Il 14 May 2008, alle 11:02, José Santos ha scritto:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
>
> Florian Weimer wrote:
> | ------------------------------------------------------------------------
> | Debian Security Advisory DSA-1576-1 security@debian.org
> | http://www.debian.org/security/ Florian Weimer
> | May 14, 2008 http://www.debian.org/security/faq
> | --------------------------------------------------------------------
> | ----
> |
> | Package : openssh
> | Vulnerability : predictable random number generator
> | Problem type : remote
> | Debian-specific: yes
> | CVE Id(s) : CVE-2008-0166
[...-cut-...]
> |
> After installing the update, i cant find the command "ssh-vulnkey".
> The command "sudo: ssh-vulnkey" returns: "sudo: ssh-vulnkey: command
> not found"
Maybe you need to run a «dist-upgrade» not only a «update», because the new package...
Best regards
Alvise Belotti,
System Administrator -- Facolta` di Lettere e Filosofia
--
%-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=%
% Alvise Belotti E-Mail: laif@lettere.unipd.it Tel: +39(0)49 8274696 %
% Those who would give up essential Liberty, to purchase a little %
% temporary Safety, deserve neither Liberty nor Safety. B. Franklin %
% PGP Key fingerprint = AD 85 93 92 A9 9C 93 14 9C 6B 3B 15 52 79 B8 BD % %-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=%
--
To UNSUBSCRIBE, email to debian-security-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Reply to: