Processed: Re: Bug#729148: Memory corruption vulnerability when using AES-GCM

2013-11-09 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 openssh 1:6.2p2-6~bpo70+1 Bug #729148 [openssh-server] Memory corruption vulnerability when using AES-GCM Bug reassigned from package 'openssh-server' to 'openssh'. No longer marked as found in versions 1:6.2p2-6~bpo7. Ignoring request to alter fixed vers

Bug#729148: Memory corruption vulnerability when using AES-GCM

2013-11-09 Thread Colin Watson
Control: reassign -1 openssh 1:6.2p2-6~bpo70+1 Control: forcemerge -1 729029 On Sat, Nov 09, 2013 at 10:54:33AM -0500, GUO Yixuan wrote: > This seems to be the same as #729029? Indeed it is, though a useful reminder that I'll need to update the version in backports as well once this is in unstabl

Bug#729148: Memory corruption vulnerability when using AES-GCM

2013-11-09 Thread GUO Yixuan
Hi, On Sat, Nov 09, 2013 at 04:08:50PM +0100, Patrick Godschalk wrote: > Package: openssh-server > Version: 1:6.2p2-6~bpo7 > Severity: grave > Tags: patch, security, fixed-upstream > > The recent security advisory from OpenSSH upstream dated 2013-11-07 > mentions that "a memory corruption vulnera

Bug#729148: Memory corruption vulnerability when using AES-GCM

2013-11-09 Thread Patrick Godschalk
Package: openssh-server Version: 1:6.2p2-6~bpo7 Severity: grave Tags: patch, security, fixed-upstream The recent security advisory from OpenSSH upstream dated 2013-11-07 mentions that "a memory corruption vulnerability exists in the post-authentication sshd process when an AES-GCM cipher (aes128-.