Processing control commands:
> reassign -1 openssh 1:6.2p2-6~bpo70+1
Bug #729148 [openssh-server] Memory corruption vulnerability when using AES-GCM
Bug reassigned from package 'openssh-server' to 'openssh'.
No longer marked as found in versions 1:6.2p2-6~bpo7.
Ignoring request to alter fixed vers
Control: reassign -1 openssh 1:6.2p2-6~bpo70+1
Control: forcemerge -1 729029
On Sat, Nov 09, 2013 at 10:54:33AM -0500, GUO Yixuan wrote:
> This seems to be the same as #729029?
Indeed it is, though a useful reminder that I'll need to update the
version in backports as well once this is in unstabl
Hi,
On Sat, Nov 09, 2013 at 04:08:50PM +0100, Patrick Godschalk wrote:
> Package: openssh-server
> Version: 1:6.2p2-6~bpo7
> Severity: grave
> Tags: patch, security, fixed-upstream
>
> The recent security advisory from OpenSSH upstream dated 2013-11-07
> mentions that "a memory corruption vulnera
Package: openssh-server
Version: 1:6.2p2-6~bpo7
Severity: grave
Tags: patch, security, fixed-upstream
The recent security advisory from OpenSSH upstream dated 2013-11-07
mentions that "a memory corruption vulnerability exists in the
post-authentication sshd process when an AES-GCM cipher
(aes128-.
4 matches
Mail list logo