Change logs for openssh source package in Disco

  • openssh (1:7.9p1-10) unstable; urgency=medium
    
      * Temporarily revert IPQoS defaults to pre-7.8 values until issues with
        "iptables -m tos" and VMware have been fixed (closes: #923879, #926229;
        LP: #1822370).
    
     -- Colin Watson <email address hidden>  Mon, 08 Apr 2019 11:13:04 +0100
  • openssh (1:7.9p1-9) unstable; urgency=medium
    
      * Apply upstream patch to make scp handle shell-style brace expansions
        when checking that filenames sent by the server match what the client
        requested (closes: #923486).
    
     -- Colin Watson <email address hidden>  Fri, 01 Mar 2019 12:23:36 +0000
  • openssh (1:7.9p1-6) unstable; urgency=medium
    
      * CVE-2019-6109: Apply upstream patches to sanitize scp filenames via
        snmprintf (closes: #793412).
      * CVE-2019-6111: Apply upstream patch to check in scp client that
        filenames sent during remote->local directory copies satisfy the
        wildcard specified by the user.
    
     -- Colin Watson <email address hidden>  Fri, 08 Feb 2019 16:26:35 +0000
  • openssh (1:7.9p1-5) unstable; urgency=high
    
      * Move /etc/ssh/moduli to openssh-server, since it's reasonably large and
        only used by sshd (closes: #858050).
      * Drop obsolete alternate build-dependency on libssl1.0-dev (closes:
        #917342).
      * CVE-2018-20685: Apply upstream scp patch to disallow empty incoming
        filename or ones that refer to the current directory (closes: #919101).
    
     -- Colin Watson <email address hidden>  Sun, 13 Jan 2019 11:22:45 +0000
  • openssh (1:7.9p1-4) unstable; urgency=medium
    
      * Fix Ubuntu detection in debian/rules, since the documentation comment
        for dpkg_vendor_derives_from is wrong (thanks, Jeremy Bicha; see
        #913816).
    
     -- Colin Watson <email address hidden>  Fri, 16 Nov 2018 11:27:28 +0000
  • openssh (1:7.9p1-1) unstable; urgency=medium
    
      * New upstream release (https://www.openssh.com/txt/release-7.9):
        - ssh(1), sshd(8): allow most port numbers to be specified using service
          names from getservbyname(3) (typically /etc/services; closes:
          #177406).
        - ssh(1): allow the IdentityAgent configuration directive to accept
          environment variable names.  This supports the use of multiple agent
          sockets without needing to use fixed paths.
        - sshd(8): support signalling sessions via the SSH protocol.  A limited
          subset of signals is supported and only for login or command sessions
          (i.e. not subsystems) that were not subject to a forced command via
          authorized_keys or sshd_config.
        - ssh(1): support "ssh -Q sig" to list supported signature options.
          Also "ssh -Q help" to show the full set of supported queries.
        - ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and
          server configs to allow control over which signature formats are
          allowed for CAs to sign certificates.  For example, this allows
          banning CAs that sign certificates using the RSA-SHA1 signature
          algorithm.
        - sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke
          keys specified by SHA256 hash.
        - ssh-keygen(1): allow creation of key revocation lists directly from
          base64-encoded SHA256 fingerprints.  This supports revoking keys using
          only the information contained in sshd(8) authentication log messages.
        - ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when
          attempting to load PEM private keys while using an incorrect
          passphrase.
        - sshd(8): when a channel closed message is received from a client,
          close the stderr file descriptor at the same time stdout is closed.
          This avoids stuck processes if they were waiting for stderr to close
          and were insensitive to stdin/out closing (closes: #844494).
        - ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
          forwarding timeout and support X11 forwarding indefinitely.
          Previously the behaviour of ForwardX11Timeout=0 was undefined.
        - sshd(8): when compiled with GSSAPI support, cache supported method
          OIDs regardless of whether GSSAPI authentication is enabled in the
          main section of sshd_config.  This avoids sandbox violations if GSSAPI
          authentication was later enabled in a Match block.
        - sshd(8): do not fail closed when configured with a text key revocation
          list that contains a too-short key.
        - ssh(1): treat connections with ProxyJump specified the same as ones
          with a ProxyCommand set with regards to hostname canonicalisation
          (i.e. don't try to canonicalise the hostname unless
          CanonicalizeHostname is set to 'always').
        - ssh(1): fix regression in OpenSSH 7.8 that could prevent public-key
          authentication using certificates hosted in a ssh-agent(1) or against
          sshd(8) from OpenSSH <7.8 (LP: #1790963).
        - All: support building against the openssl-1.1 API (releases 1.1.0g and
          later).  The openssl-1.0 API will remain supported at least until
          OpenSSL terminates security patch support for that API version
          (closes: #828475).
        - sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
          apparently required by some glibc/OpenSSL combinations.
      * Remove dh_builddeb override to use xz compression; this has been the
        default since dpkg 1.17.0.
      * Simplify debian/rules using /usr/share/dpkg/default.mk.
      * Remove /etc/network/if-up.d/openssh-server, as it causes more problems
        than it solves (thanks, Christian Ehrhardt, Andreas Hasenack, and David
        Britton; closes: #789532, LP: #1037738, #1674330, #1718227).  Add an
        "if-up hook removed" section to README.Debian documenting the corner
        case that may need configuration adjustments.
    
     -- Colin Watson <email address hidden>  Sun, 21 Oct 2018 10:39:24 +0100
  • openssh (1:7.7p1-4) unstable; urgency=high
    
      * Apply upstream patch to delay bailout for invalid authenticating user
        until after the packet containing the request has been fully parsed
        (closes: #906236).
    
     -- Colin Watson <email address hidden>  Fri, 17 Aug 2018 14:09:32 +0100