← Back to team overview

debcrafters-packages team mailing list archive

[Bug 2112050] Re: Merge openssh from Debian Unstable for questing

 

** Changed in: openssh (Ubuntu)
   Importance: Undecided => Medium

** Changed in: openssh (Ubuntu)
     Assignee: (unassigned) => Nick Rosbrook (enr0n)

-- 
You received this bug notification because you are a member of
Debcrafters packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2112050

Title:
  Merge openssh from Debian Unstable for questing

Status in openssh package in Ubuntu:
  New

Bug description:
  Scheduled-For: ubuntu-25.06
  Ubuntu: 1:9.9p1-3ubuntu3.1
  Debian Unstable: 1:10.0p1-5

  A new release of openssh is available for merging from Debian
  Unstable.

  If it turns out this needs a sync rather than a merge, please change
  the tag 'dcr-merge' to 'dcr-sync', and (optionally) update the title
  as desired.

  ### New Debian Changes ###

  openssh (1:10.0p1-5) unstable; urgency=medium

    * Ensure that configure knows the path to passwd; fixes reproducibility of
      openssh-tests.

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Fri, 09 May 2025 13:40:49
  +0100

  openssh (1:10.0p1-4) unstable; urgency=medium

    [ Daniel Kahn Gillmor ]
    * Add Requires=ssh-agent.socket to ssh-agent.service (closes: #1103522).

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Fri, 09 May 2025 10:16:45
  +0100

  openssh (1:10.0p1-3) unstable; urgency=medium

    * Disable --with-linux-memlock-onfault again, since it causes
      RLIMIT_MEMLOCK to be exceeded with some combinations of PAM modules
      (closes: #1103418).

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Wed, 07 May 2025 16:18:43
  +0100

  openssh (1:10.0p1-2) unstable; urgency=medium

    [ Colin Watson ]
    * Disable --with-linux-memlock-onfault on riscv64.
    * Build with wtmpdb (see #1102643).
    * Stop writing /var/log/btmp, since nothing reads it any more (closes:
      #1072184).
    * Restore some rdomain references in sshd_config(5) where they're
      supported on Linux, referring to ip-vrf(8) (closes: #1095686).

    [ Daniel Kahn Gillmor ]
    * Improve systemd user service socket activation (closes: #961311,
      #1039919, #1103037).

    [ Luca Boccassi ]
    * Switch from adduser to sysusers.d.
    * Add sshd-keygen service.

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Tue, 15 Apr 2025 14:19:35
  +0100

  openssh (1:10.0p1-1) unstable; urgency=medium

    [ Luca Boccassi ]
    * Add COLORTERM NO_COLOR to SendEnv and AcceptEnv.

    [ Colin Watson ]
    * New upstream release:
      - This release removes support for the weak DSA signature algorithm.
      - scp(1), sftp(1): pass "ControlMaster no" to ssh when invoked by scp &
        sftp.
      - This release has the version number 10.0 and announces itself as
        "SSH-2.0-OpenSSH_10.0". Software that naively matches versions using
        patterns like "OpenSSH_1*" may be confused by this.
      - sshd(8): this release removes the code responsible for the user
        authentication phase of the protocol from the per-connection
        sshd-session binary to a new sshd-auth binary. Splitting this code
        into a separate binary ensures that the crucial pre-authentication
        attack surface has an entirely disjoint address space from the code
        used for the rest of the connection. It also yields a small runtime
        memory saving as the authentication code will be unloaded after the
        authentication phase completes. This change should be largely
        invisible to users, though some log messages may now come from
        "sshd-auth" instead of "sshd-session".
      - sshd(8): this release disables finite field (a.k.a modp)
        Diffie-Hellman key exchange in sshd by default. Specifically, this
        removes the "diffie-hellman-group*" and
        "diffie-hellman-group-exchange-*" methods from the default
        KEXAlgorithms list. The client is unchanged and continues to support
        these methods by default.
      - sshd(8): this release removes the implicit fallback to compiled-in
        groups for Diffie-Hellman Group Exchange KEX when the moduli file
        exists but does not contain moduli within the client-requested range.
        The fallback behaviour remains for the case where the moduli file does
        not exist at all. This allows administrators more explicit control
        over which DH groups will be selected, but can lead to connection
        failures if the moduli file is edited incorrectly.
      - CVE-2025-32728: sshd(8): fix the DisableForwarding directive, which
        was failing to disable X11 forwarding and agent forwarding as
        documented (closes: #1102603). X11 forwarding is disabled by default
        in the server and agent forwarding is off by default in the client.
      - ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256 is now
        used by default for key agreement. This algorithm is considered to be
        safe against attack by quantum computers, is guaranteed to be no less
        strong than the popular curve25519-sha256 algorithm, has been
        standardised by NIST and is considerably faster than the previous
        default.
      - ssh(1): prefer AES-GCM to AES-CTR mode when selecting a cipher for the
        connection. The default cipher preference list is now
        Chacha20/Poly1305, AES-GCM (128/256) followed by AES-CTR
        (128/192/256).
      - ssh(1): add %-token and environment variable expansion to the
        ssh_config SetEnv directive.
      - ssh(1): allow %-token and environment variable expansion in the
        ssh_config User directive, with the exception of %r and %C which would
        be self-referential.
      - ssh(1), sshd(8): add "Match version" support to ssh_config and
        sshd_config. Allows matching on the local version of OpenSSH, e.g.
        "Match version OpenSSH_10.*".
      - ssh(1): add support for "Match sessiontype" to ssh_config. Allows
        matching on the type of session initially requested, either "shell"
        for interactive sessions, "exec" for command execution sessions,
        "subsystem" for subsystem requests, such as sftp, or "none" for
        transport/forwarding-only sessions.
      - ssh(1): add support for "Match command ..." support to ssh_config,
        allowing matching on the remote command as specified on the
        command-line.
      - ssh(1): allow 'Match tagged ""' and 'Match command ""' to match empty
        tag and command values respectively.
      - sshd(8): allow glob(3) patterns to be used in sshd_config
        AuthorizedKeysFile and AuthorizedPrincipalsFile directives.
      - sshd(1): support the VersionAddendum in the client, mirroring the
        option of the same name in the server.
      - ssh-agent(1): the agent will now delete all loaded keys when signaled
        with SIGUSR1. This allows deletion of keys without having access to
        $SSH_AUTH_SOCK.
      - Portable OpenSSH, ssh-agent(1): support systemd-style socket
        activation in ssh-agent using the LISTEN_PID/LISTEN_FDS mechanism.
        Activated when these environment variables are set, the agent is
        started with the -d or -D option and no socket path is set.
      - ssh-keygen(1): support FIDO tokens that return no attestation data,
        e.g. recent WinHello.
      - ssh-agent(1): add a "-Owebsafe-allow=..." option to allow the default
        FIDO application ID allow-list to be overridden.
      - ssh-keygen(1): allow "-" as output file for moduli screening.
      - sshd(8): remove assumption that the sshd_config and any configs it
        includes can fit in a (possibly enlarged) socket buffer. Previously it
        was possible to create a sufficiently large configuration that could
        cause sshd to fail to accept any connection. sshd(8) will now actively
        manage sending its config to the sshd-session sub-process.
      - ssh(1): don't start the ObscureKeystrokeTiming mitigations if there
        has been traffic on a X11 forwarding channel recently. Should fix X11
        forwarding performance problems when this setting is enabled.
      - ssh(1): prohibit the comma character in hostnames accepted, but allow
        an underscore as the first character in a hostname.
      - sftp(1): set high-water when resuming a "put". Prevents bogus "server
        reordered acks" debug message.
      - ssh(1), sshd(8): fix regression in openssh-9.8, which would fail to
        accept "Match criteria=argument" as well as the documented "Match
        criteria argument" syntax in ssh_config and sshd_config.
      - sftp(1), ssh(1): fix a number of possible NULL dereference bugs,
        including Coverity CIDs 405019 and 477813.
      - sshd(8): fix PerSourcePenalty incorrectly using "crash" penalty when
        LoginGraceTime was exceeded.
      - sshd(8): fix "Match invalid-user" from incorrectly being activated in
        initial configuration pass when no other predicates were present on
        the match line.
      - sshd(8): fix debug logging of user specific delay.
      - sshd(8): improve debug logging across sub-process boundaries.
        Previously some log messages were lost early in the sshd-auth and
        sshd-session processes' life.
      - ssh(1): require control-escape character sequences passed via the '-e
        ^x' command-line to be exactly two characters long. Avoids one byte
        out-of-bounds read if ssh is invoked as "ssh -e^ ...".
      - ssh(1), sshd(8): prevent integer overflow in x11 port handling. These
        are theoretically possible if the admin misconfigured X11DisplayOffset
        or the user misconfigures their own $DISPLAY, but don't happen in
        normal operation.
      - ssh-keygen(1): don't mess up ssh-keygen -l output when the file
        contains CR characters.
      - sshd(8): add rate limits to logging of connections dropped by
        PerSourcePenalties. Previously these could be noisy in logs.
      - ssh(1): fix argument of "Compression" directive in ssh -G config dump,
        which regressed in openssh-9.8.
      - sshd(8): fix a corner-case triggered by UpdateHostKeys when sshd
        refuses to accept the signature returned by an agent holding host keys
        during the hostkey rotation sub-protocol. This situation could occur
        in situations where a PKCS#11 smartcard that lacked support for
        particular signature algorithms was used to store host keys.
      - ssh-keygen(1): when using RSA keys to sign messages with "ssh-keygen
        -Y", select the signature algorithm based on the requested hash
        algorithm ("-Ohashalg=xxx"). This allows using something other than
        the default of rsa-sha2-512, which may not be supported on all signing
        backends, e.g. some smartcards only support SHA256.
      - sshd(8): add wtmpdb support as a Y2038 safe wtmp replacement.
      - sshd(8): add support for locking sshd into memory, enabled with the
        --with-linux-memlock-onfault configure flag.
    * Configure --with-linux-memlock-onfault on Linux.

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Fri, 11 Apr 2025 16:00:55
  +0100

  openssh (1:9.9p2-2) unstable; urgency=medium

    * Simplify most autopkgtests using needs-sudo restriction.
    * Remove obsolete slogin symlink (closes: #1098760).
    * Check if dbclient supports SHA1 before trying SHA1-based KEX (closes:
      #1100948).

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Thu, 20 Mar 2025 23:12:58
  +0000

  openssh (1:9.9p2-1) unstable; urgency=medium

    * New upstream release:
      - CVE-2025-26465: ssh(1) in OpenSSH versions 6.8p1 to 9.9p1 (inclusive)
        contained a logic error that allowed an on-path attacker (a.k.a MITM)
        to impersonate any server when the VerifyHostKeyDNS option is enabled.
        This option is off by default.
      - CVE-2025-26466: sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive)
        is vulnerable to a memory/CPU denial-of-service related to the
        handling of SSH2_MSG_PING packets. This condition may be mitigated
        using the existing PerSourcePenalties feature.
      - ssh(1), sshd(8): fix regression in Match directive that caused
        failures when predicates and their arguments were separated by '='
        characters instead of whitespace (bz3739).
      - sshd(8): fix the "Match invalid-user" predicate, which was matching
        incorrectly in the initial pass of config evaluation.

   -- Colin Watson <cjwatson@xxxxxxxxxx>  Tue, 18 Feb 2025 10:13:10
  +0000


  ### Old Ubuntu Delta ###

  openssh (1:9.9p1-3ubuntu3.1) plucky-security; urgency=medium

    * SECURITY UPDATE: incorrect DisableForwarding directive behaviour
      - debian/patches/CVE-2025-32728.patch: fix logic error in session.c.
      - CVE-2025-32728

   -- Marc Deslauriers <marc.deslauriers@xxxxxxxxxx>  Fri, 11 Apr 2025
  07:33:19 -0400

  openssh (1:9.9p1-3ubuntu3) plucky; urgency=medium

    * SECURITY UPDATE: MitM with VerifyHostKeyDNS option
      - debian/patches/CVE-2025-26465.patch: fix error code handling in
        krl.c, ssh-agent.c, ssh-sk-client.c, sshconnect2.c, sshsig.c.
      - CVE-2025-26465
    * SECURITY UPDATE: pre-authentication denial of service
      - debian/patches/CVE-2025-26466.patch: don't reply to PING in preauth
        or in KEX in packet.c.
      - CVE-2025-26466

   -- Marc Deslauriers <marc.deslauriers@xxxxxxxxxx>  Tue, 18 Feb 2025
  08:50:06 -0500

  openssh (1:9.9p1-3ubuntu2) plucky; urgency=medium

    * document /etc/ssh/sshd_config.d/*.conf better in sshd_config
      (LP: #2088207)
      - d/p/debian-config.patch: expand comment about configuration options
        and precedence of configuration snippets
      - d/openssh-server.ucf-md5sum: update for new sshd_config comments
      - d/p/sshd-socket-generator.patch: refresh for sshd_config comment
    * d/t/systemd-socket-activation: add wait while unit is reloading
      This avoids a race condition where we sometimes fail the assertion
      that ActiveState=active after systemctl reload.
      (LP: #2089049)

   -- Nick Rosbrook <enr0n@xxxxxxxxxx>  Tue, 19 Nov 2024 12:06:14 -0500

  openssh (1:9.9p1-3ubuntu1) plucky; urgency=medium

    * Merge with Debian unstable (LP: #2085261). Remaining changes:
      - Make systemd socket activation the default:
        + debian/rules: modify dh_installsystemd invocations for
          socket-activated sshd
        + debian/README.Debian: document systemd socket activation.
        + debian/patches/systemd-socket-activation.patch: Fix sshd
          re-execution behavior when socket activation is used
        + debian/tests/systemd-socket-activation: Add autopkgtest for systemd socket
          activation functionality.
        + debian/control: Build-Depends: systemd-dev
        + d/p/sshd-socket-generator.patch: add generator for socket activation
        + debian/openssh-server.install: install sshd-socket-generator
        + debian/openssh-server.postinst: handle migration to sshd-socket-generator
        + d/t/sshd-socket-generator: add dep8 test for sshd-socket-generator
        + ssh.socket: adjust unit for socket activation by default
        + debian/rules: explicitly enable LTO
      - debian/.gitignore: drop file
      - debian/openssh-server.ucf-md5sum: update for Ubuntu delta
      - debian/patches: Immediately report interactive instructions to PAM clients
      - debian/patches: sshconnect2: Write kbd-interactive messages as utf-8
      - d/t/ssh-gssapi: disable -e in cleanup()
    * Dropped changes, included in Debian:
      - SECURITY UPDATE: timing attack against echo-off password entry
        + debian/patches/CVE-2024-39894.patch: don't rely on
          channel_did_enqueue in clientloop.c
        + CVE-2024-39894
    * New changes:
      - d/p/systemd-socket-activation.patch: refresh and adapt for sshd-session
      - d/openssh-server.links: add full sshd.service -> ssh.service alias
        (LP: #2087949)

   -- Nick Rosbrook <enr0n@xxxxxxxxxx>  Tue, 12 Nov 2024 16:28:26 -0500

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2112050/+subscriptions



References