It appears that there's no need to backport a new version of OpenSSH. As
you can see here: http://www.openssh.com/txt/cbc.adv you only need to
add this line:

Ciphers aes128-ctr,aes256-ctr,arcfour256,arcfour,aes128-cbc,aes256-cbc

to ssh_config and sshd_config and restart the daemon.
Also:
The severity is considered to be potentially HIGH due to the
32 bits of plaintext that can be recovered. However, the 
likelihood of a successful attack is considered LOW.
(http://www.openssh.com/txt/cbc.adv)

-- 
Security flaw in openSSH prior to 5.2
https://bugs.launchpad.net/bugs/379329
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to