summaryrefslogtreecommitdiff
path: root/debian/changelog
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
committerColin Watson <cjwatson@debian.org>2013-11-09 14:02:03 +0000
commit35d1284f225e6b098a09b92afc01d17c73812e6b (patch)
tree4b41055057078716fe73a415d0c269a48d66ccf6 /debian/changelog
parent327155e6824b3ee13837bdde04e4eb47e147ff46 (diff)
parent210ca37aa0cdf5499f0ea847ec150fefbfbf7c39 (diff)
* New upstream release (http://www.openssh.com/txt/release-6.4).
- sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected (closes: #729029). Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv
Diffstat (limited to 'debian/changelog')
-rw-r--r--debian/changelog32
1 files changed, 19 insertions, 13 deletions
diff --git a/debian/changelog b/debian/changelog
index a7359c9c5..066a762c9 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,16 +1,22 @@
1openssh (1:6.3p1-1) UNRELEASED; urgency=low 1openssh (1:6.4p1-1) UNRELEASED; urgency=low
2 2
3 * New upstream release (http://www.openssh.com/txt/release-6.3). 3 * New upstream release. Important changes:
4 - sftp(1): add support for resuming partial downloads using the "reget" 4 - 6.3/6.3p1 (http://www.openssh.com/txt/release-6.3):
5 command and on the sftp commandline or on the "get" commandline using 5 + sftp(1): add support for resuming partial downloads using the
6 the "-a" (append) option (closes: #158590). 6 "reget" command and on the sftp commandline or on the "get"
7 - ssh(1): add an "IgnoreUnknown" configuration option to selectively 7 commandline using the "-a" (append) option (closes: #158590).
8 suppress errors arising from unknown configuration directives (closes: 8 + ssh(1): add an "IgnoreUnknown" configuration option to selectively
9 #436052). 9 suppress errors arising from unknown configuration directives
10 - sftp(1): update progressmeter when data is acknowledged, not when it's 10 (closes: #436052).
11 sent (partially addresses #708372). 11 + sftp(1): update progressmeter when data is acknowledged, not when
12 - ssh(1): do not fatally exit when attempting to cleanup multiplexing- 12 it's sent (partially addresses #708372).
13 created channels that are incompletely opened (closes: #651357). 13 + ssh(1): do not fatally exit when attempting to cleanup multiplexing-
14 created channels that are incompletely opened (closes: #651357).
15 - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4):
16 + sshd(8): fix a memory corruption problem triggered during rekeying
17 when an AES-GCM cipher is selected (closes: #729029). Full details
18 of the vulnerability are available at:
19 http://www.openssh.com/txt/gcmrekey.adv
14 * When running under Upstart, only consider the daemon started once it is 20 * When running under Upstart, only consider the daemon started once it is
15 ready to accept connections (by raising SIGSTOP at that point and using 21 ready to accept connections (by raising SIGSTOP at that point and using
16 "expect stop"). 22 "expect stop").