Accepted:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 12 Nov 2013 12:16:26 +0000 Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source i386 all Version: 1:6.4p1-1~bpo70+1 Distribution: wheezy-backports Urgency: high Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwat...@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 158590 436052 651357 729029 Changes: openssh (1:6.4p1-1~bpo70+1) wheezy-backports; urgency=low . * Rebuild for wheezy-backports. . openssh (1:6.4p1-1) unstable; urgency=high . * New upstream release. Important changes: - 6.3/6.3p1 (http://www.openssh.com/txt/release-6.3): + sftp(1): add support for resuming partial downloads using the "reget" command and on the sftp commandline or on the "get" commandline using the "-a" (append) option (closes: #158590). + ssh(1): add an "IgnoreUnknown" configuration option to selectively suppress errors arising from unknown configuration directives (closes: #436052). + sftp(1): update progressmeter when data is acknowledged, not when it's sent (partially addresses #708372). + ssh(1): do not fatally exit when attempting to cleanup multiplexing- created channels that are incompletely opened (closes: #651357). - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected (closes: #729029). Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv * When running under Upstart, only consider the daemon started once it is ready to accept connections (by raising SIGSTOP at that point and using "expect stop"). . openssh (1:6.2p2-6) unstable; urgency=low . * Update config.guess and config.sub automatically at build time. dh_autoreconf does not take care of that by default because openssh does not use automake. Checksums-Sha1: e6d0cbb6aca0dc9991fc5e43f933f8128058aab4 2618 openssh_6.4p1-1~bpo70+1.dsc cb94540b58eee51398c8d060eff49526b5314368 171149 openssh_6.4p1-1~bpo70+1.debian.tar.gz a0341340437644ea10ff261d15cd7489012f6173 611336 openssh-client_6.4p1-1~bpo70+1_i386.deb e62ce69b23c35c78b0277d816c5dbdb916b236c5 268186 openssh-server_6.4p1-1~bpo70+1_i386.deb 874d92c682f07b343b8a44265c85887a12ce3c62 1068 ssh_6.4p1-1~bpo70+1_all.deb e154ec82a06c1a74d556a37f96ce990074ce0ccb 113798 ssh-krb5_6.4p1-1~bpo70+1_all.deb 7b1c607a386a562225e71e9ed16486e231fd620f 121594 ssh-askpass-gnome_6.4p1-1~bpo70+1_i386.deb 642f504ec43f22261377d4b59eacb70a75b0f19a 186118 openssh-client-udeb_6.4p1-1~bpo70+1_i386.udeb 256fb4cd8f8e2acb8a9a1ff4014709efbf78c790 213552 openssh-server-udeb_6.4p1-1~bpo70+1_i386.udeb Checksums-Sha256: 9ae2715ba1569e52d20c3e740c6ef2ab6479d0112054abbb57eb3abfd01b971a 2618 openssh_6.4p1-1~bpo70+1.dsc f534a01e5d3fb3dcc37efc645efc26d97d7efcae7ed5944bb6862214addd53d9 171149 openssh_6.4p1-1~bpo70+1.debian.tar.gz 1a98d1b098127ea5ccea3b8f233e425d74c57872fc540ba1bf875aa8ff5ef7a3 611336 openssh-client_6.4p1-1~bpo70+1_i386.deb 36874c2936acc5239e6f213242217ad8cd09e4b13cf9bdd4bd6bc3521c6befb9 268186 openssh-server_6.4p1-1~bpo70+1_i386.deb bd7faa4d180a35b8d982a489716c9c706f12a0a6790da796d25833c139c17b9a 1068 ssh_6.4p1-1~bpo70+1_all.deb 24ec410411be18c8f86e60090bab8cc07c0a619c240d96c4e0ed62e3b7b805a2 113798 ssh-krb5_6.4p1-1~bpo70+1_all.deb 113e033c512d7d8fe0ef04d5a47c99c326cb6fe51ab03ef3a9893a449ed7062f 121594 ssh-askpass-gnome_6.4p1-1~bpo70+1_i386.deb eb628e2c02d810ff3c5169ed5bdb9d869ca594bbf0b1f2eb083d436d9d304aa2 186118 openssh-client-udeb_6.4p1-1~bpo70+1_i386.udeb afa27e2d71890f556735772e83ca8e6c32f669ba36dd3e5439c340a9fd28b25a 213552 openssh-server-udeb_6.4p1-1~bpo70+1_i386.udeb Files: b1212849a011ff9924eb5f9d728d5678 2618 net standard openssh_6.4p1-1~bpo70+1.dsc 8be9337ace40488403fc84ec3ef708ef 171149 net standard openssh_6.4p1-1~bpo70+1.debian.tar.gz 0a20545c8eeffa1f831cb0d72172ec03 611336 net standard openssh-client_6.4p1-1~bpo70+1_i386.deb 6fba58d90957a0ce79596e4a07fd3f7b 268186 net optional openssh-server_6.4p1-1~bpo70+1_i386.deb b44423503fc12ad73420ba94327e60a0 1068 net extra ssh_6.4p1-1~bpo70+1_all.deb fe6868826eff53d08cf46eff960ab351 113798 oldlibs extra ssh-krb5_6.4p1-1~bpo70+1_all.deb 1791272518bb06940a6fe7bd417f0fe5 121594 gnome optional ssh-askpass-gnome_6.4p1-1~bpo70+1_i386.deb 35d71eb8dab2a6e46be08d92ee3e8cb3 186118 debian-installer optional openssh-client-udeb_6.4p1-1~bpo70+1_i386.udeb c73eddb889b1c2d7581326ce5ff2f8a9 213552 debian-installer optional openssh-server-udeb_6.4p1-1~bpo70+1_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) Comment: Colin Watson <cjwat...@debian.org> -- Debian developer iQIVAwUBUoI5pzk1h9l9hlALAQiGrA/5AaaLVNGhseRWXKryD3rZ8OXRSYBVKMxo Rt6EbmnN4vOwf9M6+w5aX3CVZ3denGFfqG8bmpoe53MKtqQXTA9Jzk6+SHDou6oU /7mhSFOeQvvSR7DraIF/5/UXdaQQ4cFYEHTLkFxU4uhYoVifBGGRqxBFqyTC3F/5 opy+U/Gibb6RQql+H1eOFrZWHS06hrm/i/POl3RkFAnphzJq6U1A5A5mjKosflAp ZCHQv0P6rea6aG3mSj8EUo7RM5QP/MYWCVcJFx4VwPAJCcA2wnZ537hv53k1mvpb 4NNxz4JWmbTOzaH9LkLzf8kGhy1EsVOwUTqWrNqrOIJDsvzNQn07cmHmfHGm2fFZ +Z71rzffZxg73HaR/et6MmtMpT/jW2ugxG5y8ytAhmNHEvyMMXF+MrqcZsBMki/P 8IqfYtwG3505A/lDP4Y6S0lNNEgycuyCCVymdYoLPaFv9HMzYRKd/WZrUP2eBGyF PSaq0RtyZDoQrV/XgrHCHhUMYT2Mgzlqx5Hn91LY4TzYT9SYRwuclIox0idQcJGC zBupHsE8sTCIpSnwnVZYK50KBteKmaZC9GTbljrfgtvyuXRFsc9xvHJPSt8liNw+ NMc3805BzyhWPgsuAS5IkUOFKnLqs5C3mzU+HEIJWntPWNt8+Q9ANAmp1CugkxXa Rte7O8wMV78= =dPm3 -----END PGP SIGNATURE----- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-ssh-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/e1vgfl4-0000r1...@franck.debian.org