I intend to merge all the Ubuntu changes for my next Debian upload and then sync it, so there's probably no need to pay attention to this.
I'm preparing packaging of OpenSSH 8.8p1, but the current blocker is that this drops the ssh-rsa signature algorithm by default (*not* the public key type), and that needs changes to Twisted and probably lazr.sshserver in order for Launchpad's SSH endpoints to support it; I'd rather not upload a package that would break connectivity to git.launchpad.net etc. out of the box. I'm working on this but don't yet have an ETA. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1946286 Title: Merge openssh from Debian unstable for 22.04 Status in openssh package in Ubuntu: New Bug description: Scheduled-For: 22.12 Upstream: tbd Debian: 1:8.4p1-6 Ubuntu: 1:8.4p1-6ubuntu2 Debian typically updates openssh every 1 months on average, but it was last updated 21.08 and looks overdue. Check back in on this monthly. ### New Debian Changes ### openssh openssh (1:8.4p1-6) unstable; urgency=medium [ Colin Watson ] * Rename ssh group to _ssh (closes: #990456). It's only used by ssh-agent. * debian/tests/regress: Don't fail cleanup if haveged isn't running. * Backport from upstream: - Add includes.h to compat tests (closes: #992134, LP: #1939751). * Use 'command -v' in maintainer scripts rather than 'which'. [ Athos Ribeiro ] * d/systemd/ssh@.service: preserve the systemd managed runtime directory to ensure parallel processes will not disrupt one another when halting (LP: #1905285) (closes: #934663) -- Colin Watson <cjwat...@debian.org> Thu, 19 Aug 2021 11:04:01 +0100 openssh (1:8.4p1-5) unstable; urgency=high * CVE-2021-28041: Fix double free in ssh-agent(1) (closes: #984940). -- Colin Watson <cjwat...@debian.org> Sat, 13 Mar 2021 09:59:40 +0000 openssh (1:8.4p1-4) unstable; urgency=medium * Avoid using libmd's <sha2.h> even if it's installed (closes: #982705). -- Colin Watson <cjwat...@debian.org> Mon, 15 Feb 2021 10:25:17 +0000 openssh (1:8.4p1-3) unstable; urgency=medium * Backport from upstream: - Fix `EOF: command not found` error in ssh-copy-id (closes: #975540). -- Colin Watson <cjwat...@debian.org> Wed, 02 Dec 2020 10:32:23 +0000 openssh (1:8.4p1-2) unstable; urgency=medium * Revert incorrect upstream patch that claimed to fix the seccomp sandbox on x32 but in fact broke it instead. -- Colin Watson <cjwat...@debian.org> Mon, 26 Oct 2020 17:41:13 +0000 openssh (1:8.4p1-1) unstable; urgency=medium * New upstream release (https://www.openssh.com/txt/release-8.4): - [SECURITY] ssh-agent(1): restrict ssh-agent from signing web challenges for FIDO/U2F keys. - [SECURITY] ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating a FIDO resident key. - ssh-keygen(1): the format of the attestation information optionally recorded when a FIDO key is generated has changed. It now includes the authenticator data needed to validate attestation signatures. - The API between OpenSSH and the FIDO token middleware has changed and the SSH_SK_VERSION_MAJOR version has been incremented as a result. Third-party middleware libraries must support the current API version (7) to work with OpenSSH 8.4. - ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for each use. These keys may be generated using ssh-keygen using a new 'verify-required' option. When a PIN-required key is used, the user will be prompted for a PIN to complete the signature operation. - sshd(8): authorized_keys now supports a new 'verify-required' option to require FIDO signatures assert that the token verified that the user was present before making the signature. The FIDO protocol supports multiple methods for user-verification, but currently OpenSSH only supports PIN verification. - sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn signatures. Webauthn is a standard for using FIDO keys in web browsers. These signatures are a slightly different format to plain FIDO signatures and thus require explicit support. - ssh(1): allow some keywords to expand shell-style ${ENV} environment variables. The supported keywords are CertificateFile, ControlPath, IdentityAgent and IdentityFile, plus LocalForward and RemoteForward when used for Unix domain socket paths. - ssh(1), ssh-agent(1): allow some additional control over the use of ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable, including forcibly enabling and disabling its use (closes: #368657). - ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time limit for keys in addition to its current flag options. Time-limited keys will automatically be removed from ssh-agent after their expiry time has passed. - scp(1), sftp(1): allow the -A flag to explicitly enable agent forwarding in scp and sftp. The default remains to not forward an agent, even when ssh_config enables it. - ssh(1): add a '%k' TOKEN that expands to the effective HostKey of the destination. This allows, e.g., keeping host keys in individual files using 'UserKnownHostsFile ~/.ssh/known_hosts.d/%k' (closes: #481250). - ssh(1): add %-TOKEN, environment variable and tilde expansion to the UserKnownHostsFile directive, allowing the path to be completed by the configuration. - ssh-keygen(1): allow 'ssh-add -d -' to read keys to be deleted from stdin. - sshd(8): improve logging for MaxStartups connection throttling. sshd will now log when it starts and stops throttling and periodically while in this state. - ssh(1), ssh-keygen(1): better support for multiple attached FIDO tokens. In cases where OpenSSH cannot unambiguously determine which token to direct a request to, the user is now required to select a token by touching it. In cases of operations that require a PIN to be verified, this avoids sending the wrong PIN to the wrong token and ### Old Ubuntu Delta ### openssh (1:8.4p1-6ubuntu2) impish; urgency=medium * Configure with ac_cv_func_closefrom=no to avoid an incompatibility with glibc 2.34's fallback_closefrom function (LP: #1944621) -- William 'jawn-smith' Wilson <william.wil...@canonical.com> Tue, 21 Sep 2021 22:08:39 +0000 openssh (1:8.4p1-6ubuntu1) impish; urgency=low * Merge from Debian unstable (LP: #1941799). Remaining changes: - Cherry-pick seccomp fixes for glibc 2.33 thanks to Dave Jones for reports on armhf. -- William 'jawn-smith' Wilson <william.wil...@canonical.com> Thu, 26 Aug 2021 12:51:02 -0600 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1946286/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp