ssh_6.0p1-4+deb7u4_all.deb


Advertisement

Description

ssh - secure shell client and server (metapackage)

Property Value
Distribution Debian 7 (Wheezy)
Repository Debian Main amd64
Package name ssh
Package version 6.0p1
Package release 4+deb7u4
Package architecture all
Package type deb
Installed size 29 B
Download size 1.20 KB
Official Mirror ftp.br.debian.org
This metapackage is a convenient way to install both the OpenSSH client
and the OpenSSH server. It provides nothing in and of itself, so you
may remove it if nothing depends on it.

Alternatives

Package Version Architecture Repository
ssh_6.6p1-4~bpo70+1_all.deb 6.6p1 all Debian Backports Main
ssh_6.6p1-4~bpo70+1_all.deb 6.6p1 all Debian Backports Main
ssh_6.0p1-4+deb7u7_all.deb 6.0p1 all Debian Security Updates Main
ssh_6.0p1-4+deb7u7_all.deb 6.0p1 all Debian Security Updates Main
ssh_6.0p1-4+deb7u4_all.deb 6.0p1 all Debian Main
ssh - - -

Requires

Name Value
openssh-client -
openssh-server -

Download

Type URL
Binary Package ssh_6.0p1-4+deb7u4_all.deb
Source Package openssh

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install ssh deb package:
    # sudo apt-get install ssh

Files

Path
/usr/share/doc/ssh
/usr/share/lintian/overrides/ssh

Changelog

2016-04-14 - Salvatore Bonaccorso <carnil@debian.org>
openssh (1:6.0p1-4+deb7u4) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes
2016-01-13 - Yves-Alexis Perez <corsac@debian.org>
openssh (1:6.0p1-4+deb7u3) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Disable roaming in openssh client: roaming code is vulnerable to an
information leak (CVE-2016-0777) and heap-based buffer overflow
(CVE-2016-0778).
2014-06-28 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-4+deb7u2) stable; urgency=medium
* Restore patch to disable OpenSSL version check (closes: #749472).
2014-04-03 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-4+deb7u1) stable-security; urgency=high
* CVE-2014-2532: Disallow invalid characters in environment variable names
to prevent bypassing AcceptEnv wildcard restrictions.
* CVE-2014-2653: Attempt SSHFP lookup even if server presents a
certificate (closes: #742513).
2013-02-08 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-4) unstable; urgency=low
* CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups
to 10:30:100 (closes: #700102).
2012-08-24 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-3) unstable; urgency=low
* debconf template translations:
- Add Indonesian (thanks, Andika Triwidada; closes: #681670).
* Call restorecon on copied ~/.ssh/authorized_keys if possible, since some
SELinux policies require this (closes: #658675).
* Add ncurses-term to openssh-server's Recommends, since it's often needed
to support unusual terminal emulators on clients (closes: #675362).
2012-06-24 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-2) unstable; urgency=low
* Tighten libssl1.0.0 and libcrypto1.0.0-udeb dependencies to the current
"fix" version at build time (closes: #678661).
2012-05-26 - Colin Watson <cjwatson@debian.org>
openssh (1:6.0p1-1) unstable; urgency=low
[ Roger Leigh ]
* Display dynamic part of MOTD from /run/motd.dynamic, if it exists
(closes: #669699).
[ Colin Watson ]
* Update OpenSSH FAQ to revision 1.113, fixing missing line break (closes:
#669667).
* New upstream release (closes: #671010,
http://www.openssh.org/txt/release-6.0).
- Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections
(closes: #643312, #650512, #671075).
- Add a new privilege separation sandbox implementation for Linux's new
seccomp sandbox, automatically enabled on platforms that support it.
(Note: privilege separation sandboxing is still experimental.)
* Fix a bashism in configure's seccomp_filter check.
* Add a sandbox fallback mechanism, so that behaviour on Linux depends on
whether the running system's kernel has seccomp_filter support, not the
build system's kernel (forwarded upstream as
https://bugzilla.mindrot.org/show_bug.cgi?id=2011).
2012-04-02 - Colin Watson <cjwatson@debian.org>
openssh (1:5.9p1-5) unstable; urgency=low
* Use dpkg-buildflags, including for hardening support; drop use of
hardening-includes.
* Fix cross-building:
- Allow using a cross-architecture pkg-config.
- Pass default LDFLAGS to contrib/Makefile.
- Allow dh_strip to strip gnome-ssh-askpass, rather than calling
'install -s'.
2012-03-19 - Colin Watson <cjwatson@debian.org>
openssh (1:5.9p1-4) unstable; urgency=low
* Disable OpenSSL version check again, as its SONAME is sufficient
nowadays (closes: #664383).

See Also

Package Description
sshfp_1.2.2-4_all.deb DNS SSHFP records generator
sshfs_2.4-1_amd64.deb filesystem client based on SSH File Transfer Protocol
sshguard_1.5-5_amd64.deb Protects from brute force attacks against ssh
sshmenu_3.18-2_all.deb Menu for quick connections to your remote hosts
sshpass_1.05-1_amd64.deb Non-interactive ssh password authentication
sshuttle_0.54-2_all.deb Transparent proxy server for VPN over SSH
ssl-cert-check_3.22-1_all.deb proactively handling X.509 certificate expiration
ssl-cert_1.0.32+deb7u1_all.deb simple debconf wrapper for OpenSSL
ssldump_0.9b3-4.1_amd64.deb An SSLv3/TLS network protocol analyzer
sslh_1.13b-3.2_amd64.deb ssl/ssh multiplexer
sslscan_1.8.2-2_amd64.deb Fast SSL scanner
sslsniff_0.8-3+b1_amd64.deb SSL/TLS man-in-the-middle attack tool
sslstrip_0.9-1_all.deb SSL/TLS man-in-the-middle attack tool
ssmping_0.9.1-3_amd64.deb check your multicast connectivity
ssmtp_2.64-7_amd64.deb extremely simple MTA to get mail off the system to a mail hub
Advertisement
Advertisement