diff options
author | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2013-11-09 14:02:03 +0000 |
commit | 35d1284f225e6b098a09b92afc01d17c73812e6b (patch) | |
tree | 4b41055057078716fe73a415d0c269a48d66ccf6 /contrib/gnome-ssh-askpass2.c | |
parent | 327155e6824b3ee13837bdde04e4eb47e147ff46 (diff) | |
parent | 210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff) |
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected (closes: #729029). Full details
of the vulnerability are available at:
http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'contrib/gnome-ssh-askpass2.c')
0 files changed, 0 insertions, 0 deletions