Colin Watson
cjwatson at ubuntu.com
Mon Oct 31 06:55:03 CST 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 31 Oct 2005 07:46:44 -0500
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source
Version: 1:4.2p1-5ubuntu1
Distribution: dapper
Urgency: low
Maintainer: Matthew Vernon <matthew at debian.org>
Changed-By: Colin Watson <cjwatson at ubuntu.com>
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer
openssh-server - Secure shell server, an rshd replacement
openssh-server-udeb - Secure shell server for the Debian installer
ssh - Secure shell client and server (transitional package)
ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 152657 181162 208648 275472 320104 324695 326065 328372 328388 328606
Changes:
openssh (1:4.2p1-5ubuntu1) dapper; urgency=low
.
* Resynchronise with Debian.
.
openssh (1:4.2p1-5) unstable; urgency=low
.
* Add a CVE name to the 1:4.0p1-1 changelog entry.
* Build-depend on libselinux1-dev on armeb.
* Only send GSSAPI proposal if GSSAPIAuthentication is enabled.
* Build-depend on libssl-dev (>= 0.9.8-1) to cope with surprise OpenSSL
transition, since otherwise who knows what the buildds will do. If
you're building openssh yourself, you can safely ignore this and use an
older libssl-dev.
.
openssh (1:4.2p1-4) unstable; urgency=low
.
* Initialise token to GSS_C_EMPTY_BUFFER in ssh_gssapi_check_mechanism
(closes: #328606).
.
openssh (1:4.2p1-3) unstable; urgency=low
.
* Add prototype for ssh_gssapi_server_mechanisms (closes: #328372).
* Interoperate with ssh-krb5 << 3.8.1p1-1 servers, which used a slightly
different version of the gssapi authentication method (thanks, Aaron M.
Ucko; closes: #328388).
* Explicitly tell po2debconf to use the 'popular' output encoding, so that
the woody-compatibility hack works even with po-debconf 0.9.0.
.
openssh (1:4.2p1-2) unstable; urgency=low
.
* Annotate 1:4.2p1-1 changelog with CVE references.
* Add remaining pieces of Kerberos support (closes: #152657, #275472):
- Add GSSAPI key exchange support from
http://www.sxw.org.uk/computing/patches/openssh.html (thanks, Stephen
Frost).
- Build-depend on libkrb5-dev and configure --with-kerberos5=/usr.
- openssh-client and openssh-server replace ssh-krb5.
- Update commented-out Kerberos/GSSAPI options in default sshd_config.
- Fix HAVE_GSSAPI_KRB5_H/HAVE_GSSAPI_GSSAPI_KRB5_H typos in
gss-serv-krb5.c.
.
openssh (1:4.2p1-1) unstable; urgency=low
.
* New upstream release.
- SECURITY (CAN-2005-2797): Fix a bug introduced in OpenSSH 4.0 that
caused GatewayPorts to be incorrectly activated for dynamic ("-D")
port forwardings when no listen address was explicitly specified
(closes: #326065).
- SECURITY (CAN-2005-2798): Fix improper delegation of GSSAPI
credentials. This code is only built in openssh-krb5, not openssh, but
I mention the CVE reference here anyway for completeness.
- Add a new compression method ("Compression delayed") that delays zlib
compression until after authentication, eliminating the risk of zlib
vulnerabilities being exploited by unauthenticated users. Note that
users of OpenSSH versions earlier than 3.5 will need to disable
compression on the client or set "Compression yes" (losing this
security benefit) on the server.
- Increase the default size of new RSA/DSA keys generated by ssh-keygen
from 1024 to 2048 bits (closes: #181162).
- Many bugfixes and improvements to connection multiplexing.
- Don't pretend to accept $HOME (closes: #208648).
* debian/rules: Resynchronise CFLAGS with that generated by configure.
* openssh-client and openssh-server conflict with pre-split ssh to avoid
problems when ssh is left un-upgraded (closes: #324695).
* Set X11Forwarding to yes in the default sshd_config (new installs only).
At least when X11UseLocalhost is turned on, which is the default, the
security risks of using X11 forwarding are risks to the client, not to
the server (closes: #320104).
Files:
7625d880039a8b6e083c9e61f2cfce4f 999 net standard openssh_4.2p1-5ubuntu1.dsc
93295701e6bcd76fabd6a271654ed15c 928420 net standard openssh_4.2p1.orig.tar.gz
4fca5b9ea030769e62de1cff32ec70af 164313 net standard openssh_4.2p1-5ubuntu1.diff.gz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFDZhKP9t0zAhD6TNERAssVAJ9tVs3Um23MWJCmshVD464fSbiV3ACeLdQi
DPdr/MK+y0Abc0tO6ItPEp0=
=Oz/a
-----END PGP SIGNATURE-----
Accepted:
openssh_4.2p1-5ubuntu1.diff.gz
to pool/main/o/openssh/openssh_4.2p1-5ubuntu1.diff.gz
openssh_4.2p1-5ubuntu1.dsc
to pool/main/o/openssh/openssh_4.2p1-5ubuntu1.dsc
openssh_4.2p1.orig.tar.gz
to pool/main/o/openssh/openssh_4.2p1.orig.tar.gz
More information about the dapper-changes
mailing list