summaryrefslogtreecommitdiff
path: root/contrib/redhat/openssh.spec
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
committerColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
commit35d1284f225e6b098a09b92afc01d17c73812e6b (patch)
tree4b41055057078716fe73a415d0c269a48d66ccf6 /contrib/redhat/openssh.spec
parent327155e6824b3ee13837bdde04e4eb47e147ff46 (diff)
parent210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff)
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected (closes: #729029). Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'contrib/redhat/openssh.spec')
-rw-r--r--contrib/redhat/openssh.spec2
1 files changed, 1 insertions, 1 deletions
diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec
index d1191f4e1..29a38dedc 100644
--- a/contrib/redhat/openssh.spec
+++ b/contrib/redhat/openssh.spec
@@ -1,4 +1,4 @@
1%define ver 6.3p1 1%define ver 6.4p1
2%define rel 1 2%define rel 1
3 3
4# OpenSSH privilege separation requires a user & group ID 4# OpenSSH privilege separation requires a user & group ID