From 5fd6e7565fcfdf603e3fbd4b7788a33c1d5edf3f Mon Sep 17 00:00:00 2001 From: Colin Watson Date: Sat, 9 Nov 2013 14:05:12 +0000 Subject: Add CVE-2013-4548 identifier. --- debian/changelog | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'debian/changelog') diff --git a/debian/changelog b/debian/changelog index 066a762c9..f902c925e 100644 --- a/debian/changelog +++ b/debian/changelog @@ -13,9 +13,9 @@ openssh (1:6.4p1-1) UNRELEASED; urgency=low + ssh(1): do not fatally exit when attempting to cleanup multiplexing- created channels that are incompletely opened (closes: #651357). - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): - + sshd(8): fix a memory corruption problem triggered during rekeying - when an AES-GCM cipher is selected (closes: #729029). Full details - of the vulnerability are available at: + + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered + during rekeying when an AES-GCM cipher is selected (closes: + #729029). Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv * When running under Upstart, only consider the daemon started once it is ready to accept connections (by raising SIGSTOP at that point and using -- cgit v1.2.3