[ubuntu/questing-proposed] openssh 1:10.0p1-5ubuntu1 (Accepted)

Nick Rosbrook enr0n at ubuntu.com
Mon Jul 7 14:47:17 UTC 2025


openssh (1:10.0p1-5ubuntu1) questing; urgency=medium

  * Merge with Debian unstable. (LP: #2112050) Remaining changes:
    - debian/rules: modify dh_installsystemd invocations for
      socket-activated sshd
    - debian/README.Debian: document systemd socket activation.
    - debian/.gitignore: drop file
    - debian/openssh-server.ucf-md5sum: update for Ubuntu delta
    - d/p/systemd-socket-activation.patch:
      + Fix sshd re-execution behavior when socket activation is used
      + Adapt sshd-session for systemd socket activation
    - debian/tests/systemd-socket-activation: Add autopkgtest for systemd socket
      activation functionality.
    - debian/patches: Immediately report interactive instructions to PAM clients
    - debian/patches: sshconnect2: Write kbd-interactive messages as utf-8
    - debian/control: Build-Depends: systemd-dev
    - d/p/sshd-socket-generator.patch: add generator for socket activation
    - debian/openssh-server.install: install sshd-socket-generator
    - debian/openssh-server.postinst: restart whichever systemd unit is enabled
    - d/t/sshd-socket-generator: add dep8 test for sshd-socket-generator
    - ssh.socket: adjust unit for socket activation by default
    - debian/rules: explicitly enable LTO
    - d/t/ssh-gssapi: disable -e in cleanup()
    - d/p/test-set-UsePAM-no-on-some-tests.patch: set UsePAM=no for some tests
    - d/openssh-server.links: add full sshd.service -> ssh.service alias
      (LP #2087949)
    - document /etc/ssh/sshd_config.d/*.conf better in sshd_config
      (LP #2088207)
  * New changes:
    - debian/openssh-server.ucf-md5sum: update for new Ubuntu version
    - d/p/systemd-socket-activation.patch: add -N no-opt flag for sshd-auth
      Otherwise, authentication will fail in socket activated mode, due
      to the unrecognized flag.
    - d/p/debian-config.patch: refresh
  * Dropped changes, fixed upstream:
    - CVE-2025-26465.patch
    - CVE-2025-26466.patch
    - CVE-2025-32728.patch

openssh (1:10.0p1-5) unstable; urgency=medium

  * Ensure that configure knows the path to passwd; fixes reproducibility of
    openssh-tests.

openssh (1:10.0p1-4) unstable; urgency=medium

  [ Daniel Kahn Gillmor ]
  * Add Requires=ssh-agent.socket to ssh-agent.service (closes: #1103522).

openssh (1:10.0p1-3) unstable; urgency=medium

  * Disable --with-linux-memlock-onfault again, since it causes
    RLIMIT_MEMLOCK to be exceeded with some combinations of PAM modules
    (closes: #1103418).

openssh (1:10.0p1-2) unstable; urgency=medium

  [ Colin Watson ]
  * Disable --with-linux-memlock-onfault on riscv64.
  * Build with wtmpdb (see #1102643).
  * Stop writing /var/log/btmp, since nothing reads it any more (closes:
    #1072184).
  * Restore some rdomain references in sshd_config(5) where they're
    supported on Linux, referring to ip-vrf(8) (closes: #1095686).

  [ Daniel Kahn Gillmor ]
  * Improve systemd user service socket activation (closes: #961311,
    #1039919, #1103037).

  [ Luca Boccassi ]
  * Switch from adduser to sysusers.d.
  * Add sshd-keygen service.

openssh (1:10.0p1-1) unstable; urgency=medium

  [ Luca Boccassi ]
  * Add COLORTERM NO_COLOR to SendEnv and AcceptEnv.

  [ Colin Watson ]
  * New upstream release:
    - This release removes support for the weak DSA signature algorithm.
    - scp(1), sftp(1): pass "ControlMaster no" to ssh when invoked by scp &
      sftp.
    - This release has the version number 10.0 and announces itself as
      "SSH-2.0-OpenSSH_10.0". Software that naively matches versions using
      patterns like "OpenSSH_1*" may be confused by this.
    - sshd(8): this release removes the code responsible for the user
      authentication phase of the protocol from the per-connection
      sshd-session binary to a new sshd-auth binary. Splitting this code
      into a separate binary ensures that the crucial pre-authentication
      attack surface has an entirely disjoint address space from the code
      used for the rest of the connection. It also yields a small runtime
      memory saving as the authentication code will be unloaded after the
      authentication phase completes. This change should be largely
      invisible to users, though some log messages may now come from
      "sshd-auth" instead of "sshd-session".
    - sshd(8): this release disables finite field (a.k.a modp)
      Diffie-Hellman key exchange in sshd by default. Specifically, this
      removes the "diffie-hellman-group*" and
      "diffie-hellman-group-exchange-*" methods from the default
      KEXAlgorithms list. The client is unchanged and continues to support
      these methods by default.
    - sshd(8): this release removes the implicit fallback to compiled-in
      groups for Diffie-Hellman Group Exchange KEX when the moduli file
      exists but does not contain moduli within the client-requested range.
      The fallback behaviour remains for the case where the moduli file does
      not exist at all. This allows administrators more explicit control
      over which DH groups will be selected, but can lead to connection
      failures if the moduli file is edited incorrectly.
    - CVE-2025-32728: sshd(8): fix the DisableForwarding directive, which
      was failing to disable X11 forwarding and agent forwarding as
      documented (closes: #1102603). X11 forwarding is disabled by default
      in the server and agent forwarding is off by default in the client.
    - ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256 is now
      used by default for key agreement. This algorithm is considered to be
      safe against attack by quantum computers, is guaranteed to be no less
      strong than the popular curve25519-sha256 algorithm, has been
      standardised by NIST and is considerably faster than the previous
      default.
    - ssh(1): prefer AES-GCM to AES-CTR mode when selecting a cipher for the
      connection. The default cipher preference list is now
      Chacha20/Poly1305, AES-GCM (128/256) followed by AES-CTR
      (128/192/256).
    - ssh(1): add %-token and environment variable expansion to the
      ssh_config SetEnv directive.
    - ssh(1): allow %-token and environment variable expansion in the
      ssh_config User directive, with the exception of %r and %C which would
      be self-referential.
    - ssh(1), sshd(8): add "Match version" support to ssh_config and
      sshd_config. Allows matching on the local version of OpenSSH, e.g.
      "Match version OpenSSH_10.*".
    - ssh(1): add support for "Match sessiontype" to ssh_config. Allows
      matching on the type of session initially requested, either "shell"
      for interactive sessions, "exec" for command execution sessions,
      "subsystem" for subsystem requests, such as sftp, or "none" for
      transport/forwarding-only sessions.
    - ssh(1): add support for "Match command ..." support to ssh_config,
      allowing matching on the remote command as specified on the
      command-line.
    - ssh(1): allow 'Match tagged ""' and 'Match command ""' to match empty
      tag and command values respectively.
    - sshd(8): allow glob(3) patterns to be used in sshd_config
      AuthorizedKeysFile and AuthorizedPrincipalsFile directives.
    - sshd(1): support the VersionAddendum in the client, mirroring the
      option of the same name in the server.
    - ssh-agent(1): the agent will now delete all loaded keys when signaled
      with SIGUSR1. This allows deletion of keys without having access to
      $SSH_AUTH_SOCK.
    - Portable OpenSSH, ssh-agent(1): support systemd-style socket
      activation in ssh-agent using the LISTEN_PID/LISTEN_FDS mechanism.
      Activated when these environment variables are set, the agent is
      started with the -d or -D option and no socket path is set.
    - ssh-keygen(1): support FIDO tokens that return no attestation data,
      e.g. recent WinHello.
    - ssh-agent(1): add a "-Owebsafe-allow=..." option to allow the default
      FIDO application ID allow-list to be overridden.
    - ssh-keygen(1): allow "-" as output file for moduli screening.
    - sshd(8): remove assumption that the sshd_config and any configs it
      includes can fit in a (possibly enlarged) socket buffer. Previously it
      was possible to create a sufficiently large configuration that could
      cause sshd to fail to accept any connection. sshd(8) will now actively
      manage sending its config to the sshd-session sub-process.
    - ssh(1): don't start the ObscureKeystrokeTiming mitigations if there
      has been traffic on a X11 forwarding channel recently. Should fix X11
      forwarding performance problems when this setting is enabled.
    - ssh(1): prohibit the comma character in hostnames accepted, but allow
      an underscore as the first character in a hostname.
    - sftp(1): set high-water when resuming a "put". Prevents bogus "server
      reordered acks" debug message.
    - ssh(1), sshd(8): fix regression in openssh-9.8, which would fail to
      accept "Match criteria=argument" as well as the documented "Match
      criteria argument" syntax in ssh_config and sshd_config.
    - sftp(1), ssh(1): fix a number of possible NULL dereference bugs,
      including Coverity CIDs 405019 and 477813.
    - sshd(8): fix PerSourcePenalty incorrectly using "crash" penalty when
      LoginGraceTime was exceeded.
    - sshd(8): fix "Match invalid-user" from incorrectly being activated in
      initial configuration pass when no other predicates were present on
      the match line.
    - sshd(8): fix debug logging of user specific delay.
    - sshd(8): improve debug logging across sub-process boundaries.
      Previously some log messages were lost early in the sshd-auth and
      sshd-session processes' life.
    - ssh(1): require control-escape character sequences passed via the '-e
      ^x' command-line to be exactly two characters long. Avoids one byte
      out-of-bounds read if ssh is invoked as "ssh -e^ ...".
    - ssh(1), sshd(8): prevent integer overflow in x11 port handling. These
      are theoretically possible if the admin misconfigured X11DisplayOffset
      or the user misconfigures their own $DISPLAY, but don't happen in
      normal operation.
    - ssh-keygen(1): don't mess up ssh-keygen -l output when the file
      contains CR characters.
    - sshd(8): add rate limits to logging of connections dropped by
      PerSourcePenalties. Previously these could be noisy in logs.
    - ssh(1): fix argument of "Compression" directive in ssh -G config dump,
      which regressed in openssh-9.8.
    - sshd(8): fix a corner-case triggered by UpdateHostKeys when sshd
      refuses to accept the signature returned by an agent holding host keys
      during the hostkey rotation sub-protocol. This situation could occur
      in situations where a PKCS#11 smartcard that lacked support for
      particular signature algorithms was used to store host keys.
    - ssh-keygen(1): when using RSA keys to sign messages with "ssh-keygen
      -Y", select the signature algorithm based on the requested hash
      algorithm ("-Ohashalg=xxx"). This allows using something other than
      the default of rsa-sha2-512, which may not be supported on all signing
      backends, e.g. some smartcards only support SHA256.
    - sshd(8): add wtmpdb support as a Y2038 safe wtmp replacement.
    - sshd(8): add support for locking sshd into memory, enabled with the
      --with-linux-memlock-onfault configure flag.
  * Configure --with-linux-memlock-onfault on Linux.

openssh (1:9.9p2-2) unstable; urgency=medium

  * Simplify most autopkgtests using needs-sudo restriction.
  * Remove obsolete slogin symlink (closes: #1098760).
  * Check if dbclient supports SHA1 before trying SHA1-based KEX (closes:
    #1100948).

openssh (1:9.9p2-1) unstable; urgency=medium

  * New upstream release:
    - CVE-2025-26465: ssh(1) in OpenSSH versions 6.8p1 to 9.9p1 (inclusive)
      contained a logic error that allowed an on-path attacker (a.k.a MITM)
      to impersonate any server when the VerifyHostKeyDNS option is enabled.
      This option is off by default.
    - CVE-2025-26466: sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive)
      is vulnerable to a memory/CPU denial-of-service related to the
      handling of SSH2_MSG_PING packets. This condition may be mitigated
      using the existing PerSourcePenalties feature.
    - ssh(1), sshd(8): fix regression in Match directive that caused
      failures when predicates and their arguments were separated by '='
      characters instead of whitespace (bz3739).
    - sshd(8): fix the "Match invalid-user" predicate, which was matching
      incorrectly in the initial pass of config evaluation.

Date: Thu, 03 Jul 2025 16:25:27 -0400
Changed-By: Nick Rosbrook <enr0n at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/openssh/1:10.0p1-5ubuntu1
-------------- next part --------------
Format: 1.8
Date: Thu, 03 Jul 2025 16:25:27 -0400
Source: openssh
Built-For-Profiles: noudeb
Architecture: source
Version: 1:10.0p1-5ubuntu1
Distribution: questing
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Nick Rosbrook <enr0n at ubuntu.com>
Closes: 961311 1039919 1072184 1095686 1098760 1100948 1102603 1103037 1103418 1103522
Launchpad-Bugs-Fixed: 2112050
Changes:
 openssh (1:10.0p1-5ubuntu1) questing; urgency=medium
 .
   * Merge with Debian unstable. (LP: #2112050) Remaining changes:
     - debian/rules: modify dh_installsystemd invocations for
       socket-activated sshd
     - debian/README.Debian: document systemd socket activation.
     - debian/.gitignore: drop file
     - debian/openssh-server.ucf-md5sum: update for Ubuntu delta
     - d/p/systemd-socket-activation.patch:
       + Fix sshd re-execution behavior when socket activation is used
       + Adapt sshd-session for systemd socket activation
     - debian/tests/systemd-socket-activation: Add autopkgtest for systemd socket
       activation functionality.
     - debian/patches: Immediately report interactive instructions to PAM clients
     - debian/patches: sshconnect2: Write kbd-interactive messages as utf-8
     - debian/control: Build-Depends: systemd-dev
     - d/p/sshd-socket-generator.patch: add generator for socket activation
     - debian/openssh-server.install: install sshd-socket-generator
     - debian/openssh-server.postinst: restart whichever systemd unit is enabled
     - d/t/sshd-socket-generator: add dep8 test for sshd-socket-generator
     - ssh.socket: adjust unit for socket activation by default
     - debian/rules: explicitly enable LTO
     - d/t/ssh-gssapi: disable -e in cleanup()
     - d/p/test-set-UsePAM-no-on-some-tests.patch: set UsePAM=no for some tests
     - d/openssh-server.links: add full sshd.service -> ssh.service alias
       (LP #2087949)
     - document /etc/ssh/sshd_config.d/*.conf better in sshd_config
       (LP #2088207)
   * New changes:
     - debian/openssh-server.ucf-md5sum: update for new Ubuntu version
     - d/p/systemd-socket-activation.patch: add -N no-opt flag for sshd-auth
       Otherwise, authentication will fail in socket activated mode, due
       to the unrecognized flag.
     - d/p/debian-config.patch: refresh
   * Dropped changes, fixed upstream:
     - CVE-2025-26465.patch
     - CVE-2025-26466.patch
     - CVE-2025-32728.patch
 .
 openssh (1:10.0p1-5) unstable; urgency=medium
 .
   * Ensure that configure knows the path to passwd; fixes reproducibility of
     openssh-tests.
 .
 openssh (1:10.0p1-4) unstable; urgency=medium
 .
   [ Daniel Kahn Gillmor ]
   * Add Requires=ssh-agent.socket to ssh-agent.service (closes: #1103522).
 .
 openssh (1:10.0p1-3) unstable; urgency=medium
 .
   * Disable --with-linux-memlock-onfault again, since it causes
     RLIMIT_MEMLOCK to be exceeded with some combinations of PAM modules
     (closes: #1103418).
 .
 openssh (1:10.0p1-2) unstable; urgency=medium
 .
   [ Colin Watson ]
   * Disable --with-linux-memlock-onfault on riscv64.
   * Build with wtmpdb (see #1102643).
   * Stop writing /var/log/btmp, since nothing reads it any more (closes:
     #1072184).
   * Restore some rdomain references in sshd_config(5) where they're
     supported on Linux, referring to ip-vrf(8) (closes: #1095686).
 .
   [ Daniel Kahn Gillmor ]
   * Improve systemd user service socket activation (closes: #961311,
     #1039919, #1103037).
 .
   [ Luca Boccassi ]
   * Switch from adduser to sysusers.d.
   * Add sshd-keygen service.
 .
 openssh (1:10.0p1-1) unstable; urgency=medium
 .
   [ Luca Boccassi ]
   * Add COLORTERM NO_COLOR to SendEnv and AcceptEnv.
 .
   [ Colin Watson ]
   * New upstream release:
     - This release removes support for the weak DSA signature algorithm.
     - scp(1), sftp(1): pass "ControlMaster no" to ssh when invoked by scp &
       sftp.
     - This release has the version number 10.0 and announces itself as
       "SSH-2.0-OpenSSH_10.0". Software that naively matches versions using
       patterns like "OpenSSH_1*" may be confused by this.
     - sshd(8): this release removes the code responsible for the user
       authentication phase of the protocol from the per-connection
       sshd-session binary to a new sshd-auth binary. Splitting this code
       into a separate binary ensures that the crucial pre-authentication
       attack surface has an entirely disjoint address space from the code
       used for the rest of the connection. It also yields a small runtime
       memory saving as the authentication code will be unloaded after the
       authentication phase completes. This change should be largely
       invisible to users, though some log messages may now come from
       "sshd-auth" instead of "sshd-session".
     - sshd(8): this release disables finite field (a.k.a modp)
       Diffie-Hellman key exchange in sshd by default. Specifically, this
       removes the "diffie-hellman-group*" and
       "diffie-hellman-group-exchange-*" methods from the default
       KEXAlgorithms list. The client is unchanged and continues to support
       these methods by default.
     - sshd(8): this release removes the implicit fallback to compiled-in
       groups for Diffie-Hellman Group Exchange KEX when the moduli file
       exists but does not contain moduli within the client-requested range.
       The fallback behaviour remains for the case where the moduli file does
       not exist at all. This allows administrators more explicit control
       over which DH groups will be selected, but can lead to connection
       failures if the moduli file is edited incorrectly.
     - CVE-2025-32728: sshd(8): fix the DisableForwarding directive, which
       was failing to disable X11 forwarding and agent forwarding as
       documented (closes: #1102603). X11 forwarding is disabled by default
       in the server and agent forwarding is off by default in the client.
     - ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256 is now
       used by default for key agreement. This algorithm is considered to be
       safe against attack by quantum computers, is guaranteed to be no less
       strong than the popular curve25519-sha256 algorithm, has been
       standardised by NIST and is considerably faster than the previous
       default.
     - ssh(1): prefer AES-GCM to AES-CTR mode when selecting a cipher for the
       connection. The default cipher preference list is now
       Chacha20/Poly1305, AES-GCM (128/256) followed by AES-CTR
       (128/192/256).
     - ssh(1): add %-token and environment variable expansion to the
       ssh_config SetEnv directive.
     - ssh(1): allow %-token and environment variable expansion in the
       ssh_config User directive, with the exception of %r and %C which would
       be self-referential.
     - ssh(1), sshd(8): add "Match version" support to ssh_config and
       sshd_config. Allows matching on the local version of OpenSSH, e.g.
       "Match version OpenSSH_10.*".
     - ssh(1): add support for "Match sessiontype" to ssh_config. Allows
       matching on the type of session initially requested, either "shell"
       for interactive sessions, "exec" for command execution sessions,
       "subsystem" for subsystem requests, such as sftp, or "none" for
       transport/forwarding-only sessions.
     - ssh(1): add support for "Match command ..." support to ssh_config,
       allowing matching on the remote command as specified on the
       command-line.
     - ssh(1): allow 'Match tagged ""' and 'Match command ""' to match empty
       tag and command values respectively.
     - sshd(8): allow glob(3) patterns to be used in sshd_config
       AuthorizedKeysFile and AuthorizedPrincipalsFile directives.
     - sshd(1): support the VersionAddendum in the client, mirroring the
       option of the same name in the server.
     - ssh-agent(1): the agent will now delete all loaded keys when signaled
       with SIGUSR1. This allows deletion of keys without having access to
       $SSH_AUTH_SOCK.
     - Portable OpenSSH, ssh-agent(1): support systemd-style socket
       activation in ssh-agent using the LISTEN_PID/LISTEN_FDS mechanism.
       Activated when these environment variables are set, the agent is
       started with the -d or -D option and no socket path is set.
     - ssh-keygen(1): support FIDO tokens that return no attestation data,
       e.g. recent WinHello.
     - ssh-agent(1): add a "-Owebsafe-allow=..." option to allow the default
       FIDO application ID allow-list to be overridden.
     - ssh-keygen(1): allow "-" as output file for moduli screening.
     - sshd(8): remove assumption that the sshd_config and any configs it
       includes can fit in a (possibly enlarged) socket buffer. Previously it
       was possible to create a sufficiently large configuration that could
       cause sshd to fail to accept any connection. sshd(8) will now actively
       manage sending its config to the sshd-session sub-process.
     - ssh(1): don't start the ObscureKeystrokeTiming mitigations if there
       has been traffic on a X11 forwarding channel recently. Should fix X11
       forwarding performance problems when this setting is enabled.
     - ssh(1): prohibit the comma character in hostnames accepted, but allow
       an underscore as the first character in a hostname.
     - sftp(1): set high-water when resuming a "put". Prevents bogus "server
       reordered acks" debug message.
     - ssh(1), sshd(8): fix regression in openssh-9.8, which would fail to
       accept "Match criteria=argument" as well as the documented "Match
       criteria argument" syntax in ssh_config and sshd_config.
     - sftp(1), ssh(1): fix a number of possible NULL dereference bugs,
       including Coverity CIDs 405019 and 477813.
     - sshd(8): fix PerSourcePenalty incorrectly using "crash" penalty when
       LoginGraceTime was exceeded.
     - sshd(8): fix "Match invalid-user" from incorrectly being activated in
       initial configuration pass when no other predicates were present on
       the match line.
     - sshd(8): fix debug logging of user specific delay.
     - sshd(8): improve debug logging across sub-process boundaries.
       Previously some log messages were lost early in the sshd-auth and
       sshd-session processes' life.
     - ssh(1): require control-escape character sequences passed via the '-e
       ^x' command-line to be exactly two characters long. Avoids one byte
       out-of-bounds read if ssh is invoked as "ssh -e^ ...".
     - ssh(1), sshd(8): prevent integer overflow in x11 port handling. These
       are theoretically possible if the admin misconfigured X11DisplayOffset
       or the user misconfigures their own $DISPLAY, but don't happen in
       normal operation.
     - ssh-keygen(1): don't mess up ssh-keygen -l output when the file
       contains CR characters.
     - sshd(8): add rate limits to logging of connections dropped by
       PerSourcePenalties. Previously these could be noisy in logs.
     - ssh(1): fix argument of "Compression" directive in ssh -G config dump,
       which regressed in openssh-9.8.
     - sshd(8): fix a corner-case triggered by UpdateHostKeys when sshd
       refuses to accept the signature returned by an agent holding host keys
       during the hostkey rotation sub-protocol. This situation could occur
       in situations where a PKCS#11 smartcard that lacked support for
       particular signature algorithms was used to store host keys.
     - ssh-keygen(1): when using RSA keys to sign messages with "ssh-keygen
       -Y", select the signature algorithm based on the requested hash
       algorithm ("-Ohashalg=xxx"). This allows using something other than
       the default of rsa-sha2-512, which may not be supported on all signing
       backends, e.g. some smartcards only support SHA256.
     - sshd(8): add wtmpdb support as a Y2038 safe wtmp replacement.
     - sshd(8): add support for locking sshd into memory, enabled with the
       --with-linux-memlock-onfault configure flag.
   * Configure --with-linux-memlock-onfault on Linux.
 .
 openssh (1:9.9p2-2) unstable; urgency=medium
 .
   * Simplify most autopkgtests using needs-sudo restriction.
   * Remove obsolete slogin symlink (closes: #1098760).
   * Check if dbclient supports SHA1 before trying SHA1-based KEX (closes:
     #1100948).
 .
 openssh (1:9.9p2-1) unstable; urgency=medium
 .
   * New upstream release:
     - CVE-2025-26465: ssh(1) in OpenSSH versions 6.8p1 to 9.9p1 (inclusive)
       contained a logic error that allowed an on-path attacker (a.k.a MITM)
       to impersonate any server when the VerifyHostKeyDNS option is enabled.
       This option is off by default.
     - CVE-2025-26466: sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive)
       is vulnerable to a memory/CPU denial-of-service related to the
       handling of SSH2_MSG_PING packets. This condition may be mitigated
       using the existing PerSourcePenalties feature.
     - ssh(1), sshd(8): fix regression in Match directive that caused
       failures when predicates and their arguments were separated by '='
       characters instead of whitespace (bz3739).
     - sshd(8): fix the "Match invalid-user" predicate, which was matching
       incorrectly in the initial pass of config evaluation.
Checksums-Sha1:
 5b32b67cb564881bad875bbce1386a805bb735dc 3514 openssh_10.0p1-5ubuntu1.dsc
 ac4205e827aea383bf316a33a0e2d5b66b85fcf8 1972675 openssh_10.0p1.orig.tar.gz
 9623202a5dd2cee22dc5bdbe73144d15730b1f97 833 openssh_10.0p1.orig.tar.gz.asc
 079d82c6ef1fd6259fecb7ff3daf921e19d1d359 212164 openssh_10.0p1-5ubuntu1.debian.tar.xz
 755585bbea6297922213926e73d5cd375720b77d 8104 openssh_10.0p1-5ubuntu1_source.buildinfo
Checksums-Sha256:
 97f4cf274acba2ade48f43b35b05633de964bbad1857ed7a1ac2275bd388eaad 3514 openssh_10.0p1-5ubuntu1.dsc
 021a2e709a0edf4250b1256bd5a9e500411a90dddabea830ed59cef90eb9d85c 1972675 openssh_10.0p1.orig.tar.gz
 f71cf3240516ce59c2240532143982fcd97e2e286e6eb1eb6c3080a1ec012a04 833 openssh_10.0p1.orig.tar.gz.asc
 d564161e7ee4d200199ceef46688ca0c14da13ca17e9d3da3fc5b29c9474f3d4 212164 openssh_10.0p1-5ubuntu1.debian.tar.xz
 84cc40d3825f4c2b53c0aa0dbdd9da0fe6760b94d5ccc2d2c44e7d78fb48e3f3 8104 openssh_10.0p1-5ubuntu1_source.buildinfo
Files:
 ddb81fcdfff10db898e314b06b6eba02 3514 net standard openssh_10.0p1-5ubuntu1.dsc
 689148621a2eaa734497b12bed1c5202 1972675 net standard openssh_10.0p1.orig.tar.gz
 1c0cb23a67bd4e5d25a8dc423ed65a5e 833 net standard openssh_10.0p1.orig.tar.gz.asc
 93bbed026bf45d642f199ef5ac1341f2 212164 net standard openssh_10.0p1-5ubuntu1.debian.tar.xz
 1b8ea226097463d1f67a121200aa6744 8104 net standard openssh_10.0p1-5ubuntu1_source.buildinfo
Original-Maintainer: Debian OpenSSH Maintainers <debian-ssh at lists.debian.org>
Vcs-Git: https://git.launchpad.net/~enr0n/ubuntu/+source/openssh
Vcs-Git-Commit: 864f631bacd7fc380ff70f819114b83a2ad842ce
Vcs-Git-Ref: refs/heads/questing-merge


More information about the Questing-changes mailing list