[Bug 2085261] Re: Merge openssh from Debian unstable for plucky

Bryce Harrington 2085261 at bugs.launchpad.net
Tue Oct 22 18:37:46 UTC 2024


** Summary changed:

- Merge openssh from Debian unstable for jammy
+ Merge openssh from Debian unstable for plucky

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2085261

Title:
  Merge openssh from Debian unstable for plucky

Status in openssh package in Ubuntu:
  New

Bug description:
  Scheduled-For: Backlog
  Upstream: tbd
  Debian:   1:9.9p1-2    
  Ubuntu:   1:9.7p1-7ubuntu4

  
  foundations team has maintained this package's merge in the past.

  If it turns out this needs a sync rather than a merge, please change
  the tag 'needs-merge' to 'needs-sync', and (optionally) update the
  title as desired.

  If this merge pulls in a new upstream version, also consider adding an
  entry to the Jammy Release Notes:
  https://discourse.ubuntu.com/c/release/38

  
  ### New Debian Changes ###

  openssh (1:9.9p1-2) unstable; urgency=medium

    * Don't prefer host-bound public key signatures if there was no initial
      host key, as is the case when using GSS-API key exchange (closes:
      #1041521).
    * Use runuser rather than sudo in autopkgtests where possible, avoiding a
      dependency.

   -- Colin Watson <cjwatson at debian.org>  Mon, 21 Oct 2024 18:24:07
  +0100

  openssh (1:9.9p1-1) unstable; urgency=medium

    * Alias the old Debian-specific SetupTimeOut client option to
      ConnectTimeout rather than to ServerAliveInterval.
    * New upstream release (https://www.openssh.com/releasenotes.html#9.9p1):
      - ssh(1): remove support for pre-authentication compression.
      - ssh(1), sshd(8): processing of the arguments to the 'Match'
        configuration directive now follows more shell-like rules for quoted
        strings, including allowing nested quotes and /-escaped characters.
      - ssh(1), sshd(8): add support for a new hybrid post-quantum key
        exchange based on the FIPS 203 Module-Lattice Key Enapsulation
        mechanism (ML-KEM) combined with X25519 ECDH as described by
        https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
        This algorithm 'mlkem768x25519-sha256' is available by default.
      - ssh(1): the ssh_config 'Include' directive can now expand environment
        as well as the same set of %-tokens 'Match Exec' supports.
      - sshd(8): add a sshd_config 'RefuseConnection' option that, if set will
        terminate the connection at the first authentication request.
      - sshd(8): add a 'refuseconnection' penalty class to sshd_config
        PerSourcePenalties that is applied when a connection is dropped by the
        new RefuseConnection keyword.
      - sshd(8): add a 'Match invalid-user' predicate to sshd_config Match
        options that matches when the target username is not valid on the
        server.
      - ssh(1), sshd(8): update the Streamlined NTRUPrime code to a
        substantially faster implementation.
      - ssh(1), sshd(8): the hybrid Streamlined NTRUPrime/X25519 key exchange
        algorithm now has an IANA-assigned name in addition to the
        '@openssh.com' vendor extension name. This algorithm is now also
        available under this name 'sntrup761x25519-sha512'
      - ssh(1), sshd(8), ssh-agent(1): prevent private keys from being
        included in core dump files for most of their lifespans. This is in
        addition to pre-existing controls in ssh-agent(1) and sshd(8) that
        prevented coredumps.
      - All: convert key handling to use the libcrypto EVP_PKEY API, with the
        exception of DSA.
      - sshd(8): add a random amount of jitter (up to 4 seconds) to the grace
        login time to make its expiry unpredictable.
      - sshd(8): fix regression introduced in openssh-9.8 that swapped the
        order of source and destination addresses in some sshd log messages.
      - sshd(8): do not apply authorized_keys options when signature
        verification fails. Prevents more restrictive key options being
        incorrectly applied to subsequent keys in authorized_keys.
      - ssh-keygen(1): include pathname in some of ssh-keygen's passphrase
        prompts. Helps the user know what's going on when ssh-keygen is
        invoked via other tools.
      - ssh(1), ssh-add(1): make parsing user at host consistently look for the
        last '@' in the string rather than the first. This makes it possible
        to more consistently use usernames that contain '@' characters.
      - ssh(1), sshd(8): be more strict in parsing key type names. Only allow
        short names (e.g 'rsa') in user-interface code and require full SSH
        protocol names (e.g. 'ssh-rsa') everywhere else.
      - regress: many performance and correctness improvements to the
        re-keying regression test.
      - ssh-keygen(1): clarify that ed25519 is the default key type generated
        and clarify that rsa-sha2-512 is the default signature scheme when RSA
        is in use.
      - sshd(8): fix minor memory leak in Subsystem option parsing.
      - All: additional hardening and consistency checks for the sshbuf code.
      - sshd(8): reduce default logingrace penalty to ensure that a single
        forgotten login that times out will be below the penalty threshold.
      - ssh(1): fix proxy multiplexing (-O proxy) bug. If a mux started with
        ControlPersist then later has a forwarding added using mux proxy
        connection and the forwarding was used, then when the mux proxy
        session terminated, the mux master process would issue a bad message
        that terminated the connection.
      - Sync contrib/ssh-copy-id to the latest upstream version.
      - sshd(8): restore audit call before exit that regressed in openssh-9.8.
        Fixes an issue where the SSH_CONNECTION_ABANDON event was not
        recorded.
      - Fix detection of setres*id on GNU/Hurd.

   -- Colin Watson <cjwatson at debian.org>  Mon, 23 Sep 2024 21:09:59
  -0700

  openssh (1:9.8p1-8) unstable; urgency=medium

    * Source-only reupload.

   -- Colin Watson <cjwatson at debian.org>  Fri, 30 Aug 2024 00:38:26
  +0100

  openssh (1:9.8p1-7) unstable; urgency=medium

    * Adjust description line-wrapping so that lintian recognizes that
      openssh-client-gssapi is an intentionally empty package.

   -- Colin Watson <cjwatson at debian.org>  Thu, 29 Aug 2024 14:17:13
  +0100

  openssh (1:9.8p1-6) unstable; urgency=medium

    * Upload with binaries to satisfy Debian archive NEW checks.


  ### Old Ubuntu Delta ###

  openssh (1:9.7p1-7ubuntu4) oracular; urgency=medium

    * Explicitly listen on IPv4 by default, with socket-activated sshd
      (LP: #2080216)
      - d/systemd/ssh.socket: explicitly listen on ipv4 by default
      - d/t/sshd-socket-generator: update for new defaults and AddressFamily
      - sshd-socket-generator: handle new ssh.socket default settings
    * d/p/systemd-socket-activation.patch: always close newsock fd before re-exec

   -- Nick Rosbrook <enr0n at ubuntu.com>  Tue, 01 Oct 2024 14:45:28 -0400

  openssh (1:9.7p1-7ubuntu3) oracular; urgency=medium

    * sshd-socket-generator: do not parse server match config (LP:
  #2076023)

   -- Nick Rosbrook <enr0n at ubuntu.com>  Tue, 27 Aug 2024 15:54:41 -0400

  openssh (1:9.7p1-7ubuntu2) oracular; urgency=medium

    * d/p/test-set-UsePAM-no-on-some-tests.patch: restore patch
      This was mistakenly dropped in the merge from Debian after
      testing locally only.

   -- Nick Rosbrook <enr0n at ubuntu.com>  Wed, 31 Jul 2024 10:20:23 -0400

  openssh (1:9.7p1-7ubuntu1) oracular; urgency=medium

    * Merge with Debian unstable (LP: #2064435). Remaining changes:
      - Make systemd socket activation the default:
        + debian/rules: modify dh_installsystemd invocations for
          socket-activated sshd
        + debian/README.Debian: document systemd socket activation.
        + debian/patches/systemd-socket-activation.patch: Fix sshd
          re-execution behavior when socket activation is used
        + debian/tests/systemd-socket-activation: Add autopkgtest for systemd socket
          activation functionality.
        + debian/control: Build-Depends: systemd-dev
        + d/p/sshd-socket-generator.patch: add generator for socket activation
        + debian/openssh-server.install: install sshd-socket-generator
        + debian/openssh-server.postinst: handle migration to sshd-socket-generator
        + d/t/sshd-socket-generator: add dep8 test for sshd-socket-generator
        + ssh.socket: adjust unit for socket activation by default
        + debian/rules: explicitly enable LTO
      - debian/.gitignore: drop file
      - debian/openssh-server.ucf-md5sum: update for Ubuntu delta
      - debian/patches: Immediately report interactive instructions to PAM clients
      - debian/patches: sshconnect2: Write kbd-interactive messages as utf-8
      - d/t/ssh-gssapi: disable -e in cleanup()
      - SECURITY UPDATE: timing attack against echo-off password entry
        + debian/patches/CVE-2024-39894.patch: don't rely on
          channel_did_enqueue in clientloop.c
        + CVE-2024-39894
    * Dropped changes, included in Debian:
      - debian/patches: only set PAM_RHOST if remote host is not 'UNKNOWN'
      - Remove deprecated user_readenv=1 setting (LP #2059859):
        + d/openssh-server.sshd.pam.in: drop user_readenv=1, which was
          deprecated by pam_env upstream. Openssh has the SendEnv and AcceptEnv
          configuration options that can be used to replace this feature, and
          are in the default config already
        + d/NEWS: update about this change in behavior
      - debian: Remove dependency on libsystemd
      - d/p/gssapi.patch: fix method_gsskeyex structure and
        userauth_gsskeyex function regarding changes introduced in upstream
        commit dbb339f015c33d63484261d140c84ad875a9e548 ('prepare for
        multiple names for authmethods') (LP #2053146)
      - d/t/{ssh-gssapi,util}: ssh-gssapi DEP8 test for gssapi-with-mic
        and gssapi-keyex authentication methods
      - SECURITY UPDATE: remote code execution via signal handler race
        condition (LP #2070497)
        + debian/patches/CVE-2024-6387.patch: don't log in sshsigdie() in log.c.
        + CVE-2024-6387
    * Dropped changes, no longer needed:
      - debian/openssh-server.postinst: ucf workaround for LP #1968873
        [affected upgrade path not supported]
      - d/p/test-set-UsePAM-no-on-some-tests.patch: set UsePAM=no
        for some tests.

   -- Nick Rosbrook <enr0n at ubuntu.com>  Mon, 29 Jul 2024 15:19:02 -0400

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2085261/+subscriptions




More information about the foundations-bugs mailing list