diff options
author | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:05:12 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:05:12 +0000 |
commit | 5fd6e7565fcfdf603e3fbd4b7788a33c1d5edf3f (patch) | |
tree | 80f043dcd42d65cc599e5c33a5585a4b527ebb00 | |
parent | 35d1284f225e6b098a09b92afc01d17c73812e6b (diff) |
Add CVE-2013-4548 identifier.
-rw-r--r-- | debian/changelog | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/debian/changelog b/debian/changelog index 066a762c9..f902c925e 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -13,9 +13,9 @@ openssh (1:6.4p1-1) UNRELEASED; urgency=low | |||
13 | + ssh(1): do not fatally exit when attempting to cleanup multiplexing- | 13 | + ssh(1): do not fatally exit when attempting to cleanup multiplexing- |
14 | created channels that are incompletely opened (closes: #651357). | 14 | created channels that are incompletely opened (closes: #651357). |
15 | - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): | 15 | - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): |
16 | + sshd(8): fix a memory corruption problem triggered during rekeying | 16 | + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered |
17 | when an AES-GCM cipher is selected (closes: #729029). Full details | 17 | during rekeying when an AES-GCM cipher is selected (closes: |
18 | of the vulnerability are available at: | 18 | #729029). Full details of the vulnerability are available at: |
19 | http://www.openssh.com/txt/gcmrekey.adv | 19 | http://www.openssh.com/txt/gcmrekey.adv |
20 | * When running under Upstart, only consider the daemon started once it is | 20 | * When running under Upstart, only consider the daemon started once it is |
21 | ready to accept connections (by raising SIGSTOP at that point and using | 21 | ready to accept connections (by raising SIGSTOP at that point and using |