Age | Commit message (Collapse) | Author |
|
|
|
|
|
#811265).
|
|
|
|
|
|
|
|
ssh_kex2 so that it's actually effective (closes: #809696).
|
|
prohibit-password" (closes: #809695).
|
|
|
|
now figures that out automatically based on the existence of debian/tests/control.
|
|
|
|
|
|
|
|
first_kex_follows (LP: #1526357).
|
|
|
|
immediately send EOF.
|
|
|
|
|
|
|
|
|
|
outdated SSH1-only servers (closes: #807107).
|
|
#806962).
|
|
been rejected upstream and there isn't much point carrying it any more.
|
|
|
|
|
|
|
|
|
|
"PermitRootLogin prohibit-password" in sshd_config, and update documentation to reflect the new upstream default.
|
|
|
|
|
|
Ubuntu, which no longer needs it (LP: #1334916, #1502045).
|
|
|
|
architecture-independent-only build (closes: #806090).
|
|
#799271).
|
|
|
|
|
|
onto a separate line to make it easier to copy and paste (LP: #1491532).
|
|
|
|
|
|
|
|
ForwardX11Trusted in ssh(1) (closes: #781469).
|
|
|
|
keyboard-interactive authentication (closes: #793616).
|
|
- sshd(8): Fixed a privilege separation weakness related to PAM support.
Attackers who could successfully compromise the pre-authentication
process for remote code execution and who had valid credentials on the
host could impersonate other users. Reported by Moritz Jodeit.
- sshd(8): Fixed a use-after-free bug related to PAM support that was
reachable by attackers who could compromise the pre-authentication
process for remote code execution (closes: #795711). Also reported by
Moritz Jodeit.
|
|
|
|
world-writable. Local attackers may be able to write arbitrary messages to logged-in users, including terminal escape sequences. Reported by Nikolay Edigaryev.
|
|
|
|
key exchange patch.
|
|
|
|
|