summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-11-09 14:05:12 +0000
committerColin Watson <cjwatson@debian.org>2013-11-09 14:05:12 +0000
commit5fd6e7565fcfdf603e3fbd4b7788a33c1d5edf3f (patch)
tree80f043dcd42d65cc599e5c33a5585a4b527ebb00
parent35d1284f225e6b098a09b92afc01d17c73812e6b (diff)
Add CVE-2013-4548 identifier.
-rw-r--r--debian/changelog6
1 files changed, 3 insertions, 3 deletions
diff --git a/debian/changelog b/debian/changelog
index 066a762c9..f902c925e 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -13,9 +13,9 @@ openssh (1:6.4p1-1) UNRELEASED; urgency=low
13 + ssh(1): do not fatally exit when attempting to cleanup multiplexing- 13 + ssh(1): do not fatally exit when attempting to cleanup multiplexing-
14 created channels that are incompletely opened (closes: #651357). 14 created channels that are incompletely opened (closes: #651357).
15 - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): 15 - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4):
16 + sshd(8): fix a memory corruption problem triggered during rekeying 16 + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered
17 when an AES-GCM cipher is selected (closes: #729029). Full details 17 during rekeying when an AES-GCM cipher is selected (closes:
18 of the vulnerability are available at: 18 #729029). Full details of the vulnerability are available at:
19 http://www.openssh.com/txt/gcmrekey.adv 19 http://www.openssh.com/txt/gcmrekey.adv
20 * When running under Upstart, only consider the daemon started once it is 20 * When running under Upstart, only consider the daemon started once it is
21 ready to accept connections (by raising SIGSTOP at that point and using 21 ready to accept connections (by raising SIGSTOP at that point and using