Processing control commands:

> reassign -1 openssh 1:6.2p2-6~bpo70+1
Bug #729148 [openssh-server] Memory corruption vulnerability when using AES-GCM
Bug reassigned from package 'openssh-server' to 'openssh'.
No longer marked as found in versions 1:6.2p2-6~bpo7.
Ignoring request to alter fixed versions of bug #729148 to the same values 
previously set
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
There is no source info for the package 'openssh' at version 
'1:6.2p2-6~bpo70+1' with architecture ''
Unable to make a source version for version '1:6.2p2-6~bpo70+1'
Marked as found in versions 1:6.2p2-6~bpo70+1.
> forcemerge -1 729029
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
Bug #729148 [openssh] Memory corruption vulnerability when using AES-GCM
Added tag(s) upstream and pending.
Bug #729029 [openssh] openssh: CVE-2013-4548: Memory corruption in AES-GCM 
support
There is no source info for the package 'openssh' at version 
'1:6.2p2-6~bpo70+1' with architecture ''
Unable to make a source version for version '1:6.2p2-6~bpo70+1'
Marked as found in versions 1:6.2p2-6~bpo70+1.
Merged 729029 729148

-- 
729029: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729029
729148: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729148
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to