[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Processed: Re: Bug#729148: Memory corruption vulnerability when using AES-GCM



Processing control commands:

> reassign -1 openssh 1:6.2p2-6~bpo70+1
Bug #729148 [openssh-server] Memory corruption vulnerability when using AES-GCM
Bug reassigned from package 'openssh-server' to 'openssh'.
No longer marked as found in versions 1:6.2p2-6~bpo7.
Ignoring request to alter fixed versions of bug #729148 to the same values previously set
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
There is no source info for the package 'openssh' at version '1:6.2p2-6~bpo70+1' with architecture ''
Unable to make a source version for version '1:6.2p2-6~bpo70+1'
Marked as found in versions 1:6.2p2-6~bpo70+1.
> forcemerge -1 729029
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
Added tag(s) upstream and pending.
Bug #729029 [openssh] openssh: CVE-2013-4548: Memory corruption in AES-GCM support
There is no source info for the package 'openssh' at version '1:6.2p2-6~bpo70+1' with architecture ''
Unable to make a source version for version '1:6.2p2-6~bpo70+1'
Marked as found in versions 1:6.2p2-6~bpo70+1.
Merged 729029 729148

-- 
729029: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729029
729148: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729148
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems


Reply to: