Accepted openssh 1:5.5p1-6+squeeze3 (source i386 all)

2013-02-10 Thread Colin Watson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 08 Feb 2013 21:39:15 + Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source i386 all Version: 1:5.5p1-6+squeeze3 Distribution:

Bug#700102: marked as done (openssh: CVE-2010-5107 trivial DoS due to default configuration)

2013-02-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Feb 2013 15:47:04 + with message-id e1u4z7q-0007yt...@franck.debian.org and subject line Bug#700102: fixed in openssh 1:5.5p1-6+squeeze3 has caused the Debian Bug report #700102, regarding openssh: CVE-2010-5107 trivial DoS due to default configuration to be marked

openssh_5.5p1-6+squeeze3_i386.changes ACCEPTED into proposed-updates-stable-new, proposed-updates

2013-02-10 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Fri, 08 Feb 2013 21:39:15 + Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source i386 all Version: 1:5.5p1-6+squeeze3