Format: 1.7 Date: Wed, 14 Jan 2009 00:34:08 +0000 Source: openssh Binary: ssh-askpass-gnome ssh-krb5 ssh openssh-server openssh-client Architecture: amd64 Version: 1:5.1p1-5 Distribution: unstable Urgency: low Maintainer: Debian OpenSSH Maintainers Changed-By: Colin Watson Description: openssh-client - secure shell client, an rlogin/rsh/rcp replacement openssh-server - secure shell server, an rshd replacement ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 502444 Changes: openssh (1:5.1p1-5) unstable; urgency=low . * Backport from upstream CVS (Markus Friedl): - packet_disconnect() on padding error, too. Should reduce the success probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18. * Check that /var/run/sshd.pid exists and that the process ID listed there corresponds to sshd before running '/etc/init.d/ssh reload' from if-up script; SIGHUP is racy if called at boot before sshd has a chance to install its signal handler, but fortunately the pid file is written after that which lets us avoid the race (closes: #502444). * While the above is a valuable sanity-check, it turns out that it doesn't really fix the bug (thanks to Kevin Price for testing), so for the meantime we'll just use '/etc/init.d/ssh restart', even though it is unfortunately heavyweight. Files: aec44eb32016c5025d0737b635e2cec9 882472 net standard openssh-client_5.1p1-5_amd64.deb e9a4fd9c334b760217023878ddb468c7 319412 net optional openssh-server_5.1p1-5_amd64.deb 93fb1d7532b959d8a0b6dd1f33f94435 123532 gnome optional ssh-askpass-gnome_5.1p1-5_amd64.deb