[Bug 1946286] Re: Merge openssh from Debian unstable for 22.04
Colin Watson
1946286 at bugs.launchpad.net
Sun Nov 7 18:10:54 UTC 2021
I've just synced 1:8.7p1-1.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1946286
Title:
Merge openssh from Debian unstable for 22.04
Status in openssh package in Ubuntu:
Invalid
Bug description:
Scheduled-For: 22.12
Upstream: tbd
Debian: 1:8.4p1-6
Ubuntu: 1:8.4p1-6ubuntu2
Debian typically updates openssh every 1 months on average, but it was
last updated 21.08 and looks overdue. Check back in on this monthly.
### New Debian Changes ###
openssh
openssh (1:8.4p1-6) unstable; urgency=medium
[ Colin Watson ]
* Rename ssh group to _ssh (closes: #990456). It's only used by
ssh-agent.
* debian/tests/regress: Don't fail cleanup if haveged isn't running.
* Backport from upstream:
- Add includes.h to compat tests (closes: #992134, LP: #1939751).
* Use 'command -v' in maintainer scripts rather than 'which'.
[ Athos Ribeiro ]
* d/systemd/ssh at .service: preserve the systemd managed runtime directory to
ensure parallel processes will not disrupt one another when halting
(LP: #1905285) (closes: #934663)
-- Colin Watson <cjwatson at debian.org> Thu, 19 Aug 2021 11:04:01
+0100
openssh (1:8.4p1-5) unstable; urgency=high
* CVE-2021-28041: Fix double free in ssh-agent(1) (closes: #984940).
-- Colin Watson <cjwatson at debian.org> Sat, 13 Mar 2021 09:59:40
+0000
openssh (1:8.4p1-4) unstable; urgency=medium
* Avoid using libmd's <sha2.h> even if it's installed (closes:
#982705).
-- Colin Watson <cjwatson at debian.org> Mon, 15 Feb 2021 10:25:17
+0000
openssh (1:8.4p1-3) unstable; urgency=medium
* Backport from upstream:
- Fix `EOF: command not found` error in ssh-copy-id (closes: #975540).
-- Colin Watson <cjwatson at debian.org> Wed, 02 Dec 2020 10:32:23
+0000
openssh (1:8.4p1-2) unstable; urgency=medium
* Revert incorrect upstream patch that claimed to fix the seccomp sandbox
on x32 but in fact broke it instead.
-- Colin Watson <cjwatson at debian.org> Mon, 26 Oct 2020 17:41:13
+0000
openssh (1:8.4p1-1) unstable; urgency=medium
* New upstream release (https://www.openssh.com/txt/release-8.4):
- [SECURITY] ssh-agent(1): restrict ssh-agent from signing web
challenges for FIDO/U2F keys.
- [SECURITY] ssh-keygen(1): Enable FIDO 2.1 credProtect extension when
generating a FIDO resident key.
- ssh-keygen(1): the format of the attestation information optionally
recorded when a FIDO key is generated has changed. It now includes the
authenticator data needed to validate attestation signatures.
- The API between OpenSSH and the FIDO token middleware has changed and
the SSH_SK_VERSION_MAJOR version has been incremented as a result.
Third-party middleware libraries must support the current API version
(7) to work with OpenSSH 8.4.
- ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for
each use. These keys may be generated using ssh-keygen using a new
'verify-required' option. When a PIN-required key is used, the user
will be prompted for a PIN to complete the signature operation.
- sshd(8): authorized_keys now supports a new 'verify-required' option
to require FIDO signatures assert that the token verified that the
user was present before making the signature. The FIDO protocol
supports multiple methods for user-verification, but currently OpenSSH
only supports PIN verification.
- sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn
signatures. Webauthn is a standard for using FIDO keys in web
browsers. These signatures are a slightly different format to plain
FIDO signatures and thus require explicit support.
- ssh(1): allow some keywords to expand shell-style ${ENV} environment
variables. The supported keywords are CertificateFile, ControlPath,
IdentityAgent and IdentityFile, plus LocalForward and RemoteForward
when used for Unix domain socket paths.
- ssh(1), ssh-agent(1): allow some additional control over the use of
ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable,
including forcibly enabling and disabling its use (closes: #368657).
- ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time
limit for keys in addition to its current flag options. Time-limited
keys will automatically be removed from ssh-agent after their expiry
time has passed.
- scp(1), sftp(1): allow the -A flag to explicitly enable agent
forwarding in scp and sftp. The default remains to not forward an
agent, even when ssh_config enables it.
- ssh(1): add a '%k' TOKEN that expands to the effective HostKey of the
destination. This allows, e.g., keeping host keys in individual files
using 'UserKnownHostsFile ~/.ssh/known_hosts.d/%k' (closes: #481250).
- ssh(1): add %-TOKEN, environment variable and tilde expansion to the
UserKnownHostsFile directive, allowing the path to be completed by the
configuration.
- ssh-keygen(1): allow 'ssh-add -d -' to read keys to be deleted from
stdin.
- sshd(8): improve logging for MaxStartups connection throttling. sshd
will now log when it starts and stops throttling and periodically
while in this state.
- ssh(1), ssh-keygen(1): better support for multiple attached FIDO
tokens. In cases where OpenSSH cannot unambiguously determine which
token to direct a request to, the user is now required to select a
token by touching it. In cases of operations that require a PIN to be
verified, this avoids sending the wrong PIN to the wrong token and
### Old Ubuntu Delta ###
openssh (1:8.4p1-6ubuntu2) impish; urgency=medium
* Configure with ac_cv_func_closefrom=no to avoid an incompatibility
with glibc 2.34's fallback_closefrom function (LP: #1944621)
-- William 'jawn-smith' Wilson <william.wilson at canonical.com> Tue,
21 Sep 2021 22:08:39 +0000
openssh (1:8.4p1-6ubuntu1) impish; urgency=low
* Merge from Debian unstable (LP: #1941799). Remaining changes:
- Cherry-pick seccomp fixes for glibc 2.33 thanks to Dave Jones for
reports on armhf.
-- William 'jawn-smith' Wilson <william.wilson at canonical.com> Thu,
26 Aug 2021 12:51:02 -0600
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1946286/+subscriptions
More information about the foundations-bugs
mailing list