Package "openssh"

Name: openssh


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • secure shell (SSH) client, for secure access to remote machines
  • secure shell (SSH) server, for secure access from remote machines
  • secure shell (SSH) sftp server module, for SFTP access from remote machines
  • secure shell client and server (metapackage)

Latest version: 1:6.6p1-2ubuntu1
Release: trusty (14.04)
Level: base
Repository: main


Other versions of "openssh" in Trusty

Repository Area Version
base universe 1:6.6p1-2ubuntu1
security universe 1:6.6p1-2ubuntu2.13
security main 1:6.6p1-2ubuntu2.13
updates universe 1:6.6p1-2ubuntu2.13
updates main 1:6.6p1-2ubuntu2.13

Packages in group

Deleted packages are displayed in grey.


Version: 1:6.6p1-2ubuntu1 2014-04-14 17:07:08 UTC

  openssh (1:6.6p1-2ubuntu1) trusty; urgency=medium

  * Upload from Debian git repository to fix a release-critical bug.
  * Debconf translations:
    - French (thanks, ��tienne Gilli; closes: #743242).
  * Never signal the service supervisor with SIGSTOP more than once, to
    prevent a hang on re-exec (thanks, Robie Basak; LP: #1306877).
 -- Colin Watson <email address hidden> Mon, 14 Apr 2014 12:20:48 +0100

Source diff to previous version
1306877 sshd stops accepting new connections after configuration reload
743242 openssh: [INTL:fr] French debconf translation update - Debian Bug report logs

Version: 1:6.6p1-2 2014-03-31 23:07:00 UTC

  openssh (1:6.6p1-2) unstable; urgency=medium

  * If no root password is set, then switch to "PermitRootLogin
    without-password" without asking (LP: #1300127).

 -- Colin Watson <email address hidden> Mon, 31 Mar 2014 12:20:46 +0100

Source diff to previous version
1300127 unnecessary configuration question

Version: 1:6.6p1-1 2014-03-30 07:07:25 UTC

  openssh (1:6.6p1-1) unstable; urgency=medium

  [ Colin Watson ]
  * Apply various warning-suppression and regression-test fixes to
    gssapi.patch from Damien Miller.
  * New upstream release (http://www.openssh.com/txt/release-6.6,
    LP: #1298280):
    - CVE-2014-2532: sshd(8): when using environment passing with an
      sshd_config(5) AcceptEnv pattern with a wildcard, OpenSSH prior to 6.6
      could be tricked into accepting any environment variable that contains
      the characters before the wildcard character.
  * Re-enable btmp logging, as its permissions were fixed a long time ago in
    response to #370050 (closes: #341883).
  * Change to "PermitRootLogin without-password" for new installations, and
    ask a debconf question when upgrading systems with "PermitRootLogin yes"
    from previous versions (closes: #298138).
  * Debconf translations:
    - Danish (thanks, Joe Hansen).
    - Portuguese (thanks, Am��rico Monteiro).
    - Russian (thanks, Yuri Kozlov; closes: #742308).
    - Swedish (thanks, Andreas R��nnquist).
    - Japanese (thanks, victory).
    - German (thanks, Stephan Beck; closes: #742541).
    - Italian (thanks, Beatrice Torracca).
  * Don't start ssh-agent from the Upstart user session job if something
    like Xsession has already done so (based on work by Bruno Vasselle;
    LP: #1244736).

  [ Matthew Vernon ]
  * CVE-2014-2653: Fix failure to check SSHFP records if server presents a
    certificate (bug reported by me, patch by upstream's Damien Miller;
    thanks also to Mark Wooding for his help in fixing this) (Closes:

 -- Colin Watson <email address hidden> Fri, 28 Mar 2014 18:04:41 +0000

Source diff to previous version
1298280 Update OpenSSH to 6.6
1244736 upstart configuration for user launches an extra ssh-agent
341883 openssh-server: doesn't log bad login attempts to /var/log/btmp - Debian Bug report logs
298138 ssh: PermitRootLogin should defaul to "no" - Debian Bug report logs
742308 openssh: [INTL:ru] Russian debconf templates translation - Debian Bug report logs
742541 [openssh] openssh [INTL:de] German debconf templates translation - Debian Bug report logs
CVE-2014-2532 openssh: AcceptEnv environment restriction bypass flaw
CVE-2014-2653 if the server offers a certificate, the client doesn't check the DNS for SSHFP records

Version: 1:6.5p1-6 2014-03-07 13:07:34 UTC

  openssh (1:6.5p1-6) unstable; urgency=medium

  * Fix Breaks/Replaces versions of openssh-sftp-server on openssh-server
    (thanks, Axel Beckert).

 -- Colin Watson <email address hidden> Thu, 06 Mar 2014 16:18:44 +0000

Source diff to previous version

Version: 1:6.5p1-4 2014-02-17 04:07:30 UTC

  openssh (1:6.5p1-4) unstable; urgency=medium

  * Configure --without-hardening on hppa, to work around
    http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60155 (closes: #738798).
  * Amend "Running sshd from inittab" instructions in README.Debian to
    recommend 'update-rc.d ssh disable', rather than manual removal of rc*.d
    symlinks that won't work with dependency-based sysv-rc.
  * Remove code related to non-dependency-based sysv-rc ordering, since that
    is no longer supported.
  * Apply patch from https://bugzilla.mindrot.org/show_bug.cgi?id=2200 to
    fix getsockname errors when using "ssh -W" (closes: #738693).

 -- Colin Watson <email address hidden> Sat, 15 Feb 2014 02:19:36 +0000

738798 openssh: FTBFS on hppa -- -fwrapv causes ICE compiling ssh-genkey.c - Debian Bug report logs
738693 ssh -W causes "getsockname failed: Bad file descriptor" errors - Debian Bug report logs

About   -   Send Feedback to @ubuntu_updates