Processing control commands: > reassign -1 openssh 1:6.2p2-6~bpo70+1 Bug #729148 [openssh-server] Memory corruption vulnerability when using AES-GCM Bug reassigned from package 'openssh-server' to 'openssh'. No longer marked as found in versions 1:6.2p2-6~bpo7. Ignoring request to alter fixed versions of bug #729148 to the same values previously set Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM There is no source info for the package 'openssh' at version '1:6.2p2-6~bpo70+1' with architecture '' Unable to make a source version for version '1:6.2p2-6~bpo70+1' Marked as found in versions 1:6.2p2-6~bpo70+1. > forcemerge -1 729029 Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM Added tag(s) upstream and pending. Bug #729029 [openssh] openssh: CVE-2013-4548: Memory corruption in AES-GCM support There is no source info for the package 'openssh' at version '1:6.2p2-6~bpo70+1' with architecture '' Unable to make a source version for version '1:6.2p2-6~bpo70+1' Marked as found in versions 1:6.2p2-6~bpo70+1. Merged 729029 729148
-- 729029: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729029 729148: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729148 Debian Bug Tracking System Contact [email protected] with problems -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

