[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Installed openssh 1:1.2.3-5 (all source i386)



Installed:
ssh-askpass-gnome_1.2.3-5_i386.deb
  to dists/potato/non-US/main/binary-i386/ssh-askpass-gnome_1.2.3-5.deb
  replacing ssh-askpass-gnome_1.2.3-4.deb
ssh-askpass-gnome_1.2.3-5_i386.deb
  to dists/woody/non-US/main/binary-i386/ssh-askpass-gnome_1.2.3-5.deb
  replacing ssh-askpass-gnome_1.2.3-4.deb
ssh-askpass-ptk_1.2.3-5_all.deb
  to dists/potato/non-US/main/binary-all/ssh-askpass-ptk_1.2.3-5.deb
  replacing ssh-askpass-ptk_1.2.3-4.deb
ssh-askpass-ptk_1.2.3-5_all.deb
  to dists/woody/non-US/main/binary-all/ssh-askpass-ptk_1.2.3-5.deb
  replacing ssh-askpass-ptk_1.2.3-4.deb
openssh_1.2.3-5.diff.gz
  to dists/potato/non-US/main/source/openssh_1.2.3-5.diff.gz
  replacing openssh_1.2.3-4.diff.gz
openssh_1.2.3-5.diff.gz
  to dists/woody/non-US/main/source/openssh_1.2.3-5.diff.gz
  replacing openssh_1.2.3-4.diff.gz
ssh_1.2.3-5_i386.deb
  to dists/potato/non-US/main/binary-i386/ssh_1.2.3-5.deb
  replacing ssh_1.2.3-4.deb
ssh_1.2.3-5_i386.deb
  to dists/woody/non-US/main/binary-i386/ssh_1.2.3-5.deb
  replacing ssh_1.2.3-4.deb
openssh_1.2.3-5.dsc
  to dists/potato/non-US/main/source/openssh_1.2.3-5.dsc
  replacing openssh_1.2.3-4.dsc
openssh_1.2.3-5.dsc
  to dists/woody/non-US/main/source/openssh_1.2.3-5.dsc
  replacing openssh_1.2.3-4.dsc


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.6
Date: Mon, 12 Jun 2000 23:05:11 +0100
Source: openssh
Binary: ssh-askpass-ptk ssh ssh-askpass-gnome
Architecture: source i386 all
Version: 1:1.2.3-5
Distribution: frozen unstable
Urgency: low
Maintainer: Philip Hands <phil@hands.com>
Description: 
 ssh        - Secure rlogin/rsh/rcp replacement (OpenSSH)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
 ssh-askpass-ptk - under X, asks user for a passphrase for ssh-add
Closes: 63948 64795 65104 65495
Changes: 
 openssh (1:1.2.3-5) frozen unstable; urgency=low
 .
   * add code to prevent UseLogin exploit, although I think our PAM
     conditional code breaks UseLogin in a way that protects us from this
     exploit anyway. ;-)  (closes: #65495)  *RC*
   * Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to fix keyboard
     grab vulnerability in ssh-askpass-gnome (closes: #64795) *RC*
   * stop redirection of sshd's file descriptors (introduced in 1:1.2.3-3)
     and use db_stop in the postinst to solve that problem instead
     (closes: #65104)
   * add Provides: rsh-server to ssh (closes: #63948)
   * provide config option not to run sshd
Files: 
 e759e7a6da7070e85debc0c336e6cf05 587 non-US/main optional openssh_1.2.3-5.dsc
 3cc9a91697f439c60e4a7192404440c2 22325 non-US/main optional openssh_1.2.3-5.diff.gz
 71018f111c1ffbc76cbadf11254514b3 7066 non-US/main optional ssh-askpass-ptk_1.2.3-5_all.deb
 aa13141c43e6bd1c7bd0dc79767e73ee 254746 non-US/main optional ssh_1.2.3-5_i386.deb
 7f92befecfbd022cd055e7c8396211c2 26422 non-US/main optional ssh-askpass-gnome_1.2.3-5_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5RXawYgOKS92bmRARAuQyAJ43nGcVUx+ttizlrj69P6w/dPkrKwCgoz6N
s5QZwjEXECzFaPfOuOf383E=
=TCwf
-----END PGP SIGNATURE-----



Reply to: