diff options
author | Colin Watson <cjwatson@debian.org> | 2018-10-19 21:29:01 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2018-10-20 22:54:15 +0100 |
commit | d80ebbf028196b2478beebf5a290b97f35e1eed9 (patch) | |
tree | 6666a5484923a26738675ff27a6186cfe15d4cad /debian/changelog | |
parent | 4f5bbf3f11efeec65bbd56464b20a19bd250e5cc (diff) | |
parent | 1d2a55436d4b556269f42ad5f7e16608b5a8ed74 (diff) |
New upstream release (7.9p1)
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 64e1145c4..68fb28bb3 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,3 +1,60 @@ | |||
1 | openssh (1:7.9p1-1) UNRELEASED; urgency=medium | ||
2 | |||
3 | * New upstream release (https://www.openssh.com/txt/release-7.9): | ||
4 | - ssh(1), sshd(8): allow most port numbers to be specified using service | ||
5 | names from getservbyname(3) (typically /etc/services; closes: | ||
6 | #177406). | ||
7 | - ssh(1): allow the IdentityAgent configuration directive to accept | ||
8 | environment variable names. This supports the use of multiple agent | ||
9 | sockets without needing to use fixed paths. | ||
10 | - sshd(8): support signalling sessions via the SSH protocol. A limited | ||
11 | subset of signals is supported and only for login or command sessions | ||
12 | (i.e. not subsystems) that were not subject to a forced command via | ||
13 | authorized_keys or sshd_config. | ||
14 | - ssh(1): support "ssh -Q sig" to list supported signature options. | ||
15 | Also "ssh -Q help" to show the full set of supported queries. | ||
16 | - ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and | ||
17 | server configs to allow control over which signature formats are | ||
18 | allowed for CAs to sign certificates. For example, this allows | ||
19 | banning CAs that sign certificates using the RSA-SHA1 signature | ||
20 | algorithm. | ||
21 | - sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke | ||
22 | keys specified by SHA256 hash. | ||
23 | - ssh-keygen(1): allow creation of key revocation lists directly from | ||
24 | base64-encoded SHA256 fingerprints. This supports revoking keys using | ||
25 | only the information contained in sshd(8) authentication log messages. | ||
26 | - ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when | ||
27 | attempting to load PEM private keys while using an incorrect | ||
28 | passphrase. | ||
29 | - sshd(8): when a channel closed message is received from a client, | ||
30 | close the stderr file descriptor at the same time stdout is closed. | ||
31 | This avoids stuck processes if they were waiting for stderr to close | ||
32 | and were insensitive to stdin/out closing (closes: #844494). | ||
33 | - ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11 | ||
34 | forwarding timeout and support X11 forwarding indefinitely. | ||
35 | Previously the behaviour of ForwardX11Timeout=0 was undefined. | ||
36 | - sshd(8): when compiled with GSSAPI support, cache supported method | ||
37 | OIDs regardless of whether GSSAPI authentication is enabled in the | ||
38 | main section of sshd_config. This avoids sandbox violations if GSSAPI | ||
39 | authentication was later enabled in a Match block. | ||
40 | - sshd(8): do not fail closed when configured with a text key revocation | ||
41 | list that contains a too-short key. | ||
42 | - ssh(1): treat connections with ProxyJump specified the same as ones | ||
43 | with a ProxyCommand set with regards to hostname canonicalisation | ||
44 | (i.e. don't try to canonicalise the hostname unless | ||
45 | CanonicalizeHostname is set to 'always'). | ||
46 | - ssh(1): fix regression in OpenSSH 7.8 that could prevent public-key | ||
47 | authentication using certificates hosted in a ssh-agent(1) or against | ||
48 | sshd(8) from OpenSSH <7.8 (LP: #1790963). | ||
49 | - All: support building against the openssl-1.1 API (releases 1.1.0g and | ||
50 | later). The openssl-1.0 API will remain supported at least until | ||
51 | OpenSSL terminates security patch support for that API version | ||
52 | (closes: #828475). | ||
53 | - sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox; | ||
54 | apparently required by some glibc/OpenSSL combinations. | ||
55 | |||
56 | -- Colin Watson <cjwatson@debian.org> Fri, 19 Oct 2018 21:34:47 +0100 | ||
57 | |||
1 | openssh (1:7.8p1-1) unstable; urgency=medium | 58 | openssh (1:7.8p1-1) unstable; urgency=medium |
2 | 59 | ||
3 | * New upstream release (https://www.openssh.com/txt/release-7.8, closes: | 60 | * New upstream release (https://www.openssh.com/txt/release-7.8, closes: |