ssh-askpass-gnome_6.0p1-4+deb7u4_amd64.deb


Advertisement

Description

ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-add

Distribution: Debian 7 (Wheezy)
Repository: Debian Main amd64
Package name: ssh-askpass-gnome
Package version: 6.0p1
Package release: 4+deb7u4
Package architecture: amd64
Package type: deb
Installed size: 154 B
Download size: 95.26 KB
Official Mirror: ftp.br.debian.org
This has been split out of the main openssh-client package so that openssh-client does not need to depend on GTK+. You probably want the ssh-askpass package instead, but this is provided to add to your choice and/or confusion.

Alternatives

Provides

  • ssh-askpass

Replaces

  • ssh << 1:3.5p1-3

    Download

    Source package: openssh

    Install Howto

    1. Update the package index:
      # sudo apt-get update
    2. Install ssh-askpass-gnome deb package:
      # sudo apt-get install ssh-askpass-gnome

    Files

    • /usr/lib/openssh/gnome-ssh-askpass
    • /usr/share/doc/ssh-askpass-gnome/NEWS.Debian.gz
    • /usr/share/doc/ssh-askpass-gnome/changelog.Debian.gz
    • /usr/share/doc/ssh-askpass-gnome/changelog.gz
    • /usr/share/doc/ssh-askpass-gnome/copyright
    • /usr/share/doc/ssh-askpass-gnome/examples/ssh-askpass-gnome.desktop
    • /usr/share/man/man1/gnome-ssh-askpass.1.gz
    • /usr/share/pixmaps/ssh-askpass-gnome.png

    Changelog

    2016-04-14 - Salvatore Bonaccorso <carnil@debian.org> openssh (1:6.0p1-4+deb7u4) wheezy-security; urgency=high * Non-maintainer upload by the Security Team. * CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes

    2016-01-13 - Yves-Alexis Perez <corsac@debian.org> openssh (1:6.0p1-4+deb7u3) wheezy-security; urgency=high * Non-maintainer upload by the Security Team. * Disable roaming in openssh client: roaming code is vulnerable to an information leak (CVE-2016-0777) and heap-based buffer overflow (CVE-2016-0778).

    2014-06-28 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-4+deb7u2) stable; urgency=medium * Restore patch to disable OpenSSL version check (closes: #749472).

    2014-04-03 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-4+deb7u1) stable-security; urgency=high * CVE-2014-2532: Disallow invalid characters in environment variable names to prevent bypassing AcceptEnv wildcard restrictions. * CVE-2014-2653: Attempt SSHFP lookup even if server presents a certificate (closes: #742513).

    2013-02-08 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-4) unstable; urgency=low * CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups to 10:30:100 (closes: #700102).

    2012-08-24 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-3) unstable; urgency=low * debconf template translations: - Add Indonesian (thanks, Andika Triwidada; closes: #681670). * Call restorecon on copied ~/.ssh/authorized_keys if possible, since some SELinux policies require this (closes: #658675). * Add ncurses-term to openssh-server's Recommends, since it's often needed to support unusual terminal emulators on clients (closes: #675362).

    2012-06-24 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-2) unstable; urgency=low * Tighten libssl1.0.0 and libcrypto1.0.0-udeb dependencies to the current "fix" version at build time (closes: #678661).

    2012-05-26 - Colin Watson <cjwatson@debian.org> openssh (1:6.0p1-1) unstable; urgency=low [ Roger Leigh ] * Display dynamic part of MOTD from /run/motd.dynamic, if it exists (closes: #669699). [ Colin Watson ] * Update OpenSSH FAQ to revision 1.113, fixing missing line break (closes: #669667). * New upstream release (closes: #671010, http://www.openssh.org/txt/release-6.0). - Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections (closes: #643312, #650512, #671075). - Add a new privilege separation sandbox implementation for Linux's new seccomp sandbox, automatically enabled on platforms that support it. (Note: privilege separation sandboxing is still experimental.) * Fix a bashism in configure's seccomp_filter check. * Add a sandbox fallback mechanism, so that behaviour on Linux depends on whether the running system's kernel has seccomp_filter support, not the build system's kernel (forwarded upstream as https://bugzilla.mindrot.org/show_bug.cgi?id=2011).

    2012-04-02 - Colin Watson <cjwatson@debian.org> openssh (1:5.9p1-5) unstable; urgency=low * Use dpkg-buildflags, including for hardening support; drop use of hardening-includes. * Fix cross-building: - Allow using a cross-architecture pkg-config. - Pass default LDFLAGS to contrib/Makefile. - Allow dh_strip to strip gnome-ssh-askpass, rather than calling 'install -s'.

    2012-03-19 - Colin Watson <cjwatson@debian.org> openssh (1:5.9p1-4) unstable; urgency=low * Disable OpenSSL version check again, as its SONAME is sufficient nowadays (closes: #664383).

    Advertisement
    Advertisement