Installed openssh 1:1.2.3-5 (all source i386)
Installed:
ssh-askpass-gnome_1.2.3-5_i386.deb
to dists/potato/non-US/main/binary-i386/ssh-askpass-gnome_1.2.3-5.deb
replacing ssh-askpass-gnome_1.2.3-4.deb
ssh-askpass-gnome_1.2.3-5_i386.deb
to dists/woody/non-US/main/binary-i386/ssh-askpass-gnome_1.2.3-5.deb
replacing ssh-askpass-gnome_1.2.3-4.deb
ssh-askpass-ptk_1.2.3-5_all.deb
to dists/potato/non-US/main/binary-all/ssh-askpass-ptk_1.2.3-5.deb
replacing ssh-askpass-ptk_1.2.3-4.deb
ssh-askpass-ptk_1.2.3-5_all.deb
to dists/woody/non-US/main/binary-all/ssh-askpass-ptk_1.2.3-5.deb
replacing ssh-askpass-ptk_1.2.3-4.deb
openssh_1.2.3-5.diff.gz
to dists/potato/non-US/main/source/openssh_1.2.3-5.diff.gz
replacing openssh_1.2.3-4.diff.gz
openssh_1.2.3-5.diff.gz
to dists/woody/non-US/main/source/openssh_1.2.3-5.diff.gz
replacing openssh_1.2.3-4.diff.gz
ssh_1.2.3-5_i386.deb
to dists/potato/non-US/main/binary-i386/ssh_1.2.3-5.deb
replacing ssh_1.2.3-4.deb
ssh_1.2.3-5_i386.deb
to dists/woody/non-US/main/binary-i386/ssh_1.2.3-5.deb
replacing ssh_1.2.3-4.deb
openssh_1.2.3-5.dsc
to dists/potato/non-US/main/source/openssh_1.2.3-5.dsc
replacing openssh_1.2.3-4.dsc
openssh_1.2.3-5.dsc
to dists/woody/non-US/main/source/openssh_1.2.3-5.dsc
replacing openssh_1.2.3-4.dsc
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.6
Date: Mon, 12 Jun 2000 23:05:11 +0100
Source: openssh
Binary: ssh-askpass-ptk ssh ssh-askpass-gnome
Architecture: source i386 all
Version: 1:1.2.3-5
Distribution: frozen unstable
Urgency: low
Maintainer: Philip Hands <phil@hands.com>
Description:
ssh - Secure rlogin/rsh/rcp replacement (OpenSSH)
ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
ssh-askpass-ptk - under X, asks user for a passphrase for ssh-add
Closes: 63948 64795 65104 65495
Changes:
openssh (1:1.2.3-5) frozen unstable; urgency=low
.
* add code to prevent UseLogin exploit, although I think our PAM
conditional code breaks UseLogin in a way that protects us from this
exploit anyway. ;-) (closes: #65495) *RC*
* Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to fix keyboard
grab vulnerability in ssh-askpass-gnome (closes: #64795) *RC*
* stop redirection of sshd's file descriptors (introduced in 1:1.2.3-3)
and use db_stop in the postinst to solve that problem instead
(closes: #65104)
* add Provides: rsh-server to ssh (closes: #63948)
* provide config option not to run sshd
Files:
e759e7a6da7070e85debc0c336e6cf05 587 non-US/main optional openssh_1.2.3-5.dsc
3cc9a91697f439c60e4a7192404440c2 22325 non-US/main optional openssh_1.2.3-5.diff.gz
71018f111c1ffbc76cbadf11254514b3 7066 non-US/main optional ssh-askpass-ptk_1.2.3-5_all.deb
aa13141c43e6bd1c7bd0dc79767e73ee 254746 non-US/main optional ssh_1.2.3-5_i386.deb
7f92befecfbd022cd055e7c8396211c2 26422 non-US/main optional ssh-askpass-gnome_1.2.3-5_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5RXawYgOKS92bmRARAuQyAJ43nGcVUx+ttizlrj69P6w/dPkrKwCgoz6N
s5QZwjEXECzFaPfOuOf383E=
=TCwf
-----END PGP SIGNATURE-----
Reply to: