Package: release.debian.org
Severity: normal
X-Debbugs-Cc: open...@packages.debian.org
Control: affects -1 + src:openssh
User: release.debian....@packages.debian.org
Usertags: unblock

I know the hard freeze hasn't started yet, but this openssh upload isn't 
quite going to make it into testing in time, and since it's a key 
package you're going to need to review it anyway; so I might as well get 
the request in early.  This fixes one grave bug (#1103418), one serious 
bug (#1104992, filed after the upload so not in the changelog) and one 
important bug (#1103522).  All the changes are as targeted as I believe 
to be possible.

The --with-linux-memlock-onfault change is probably the only non-obvious 
one; see https://bugzilla.mindrot.org/show_bug.cgi?id=3822 for more 
details there.  It's basically just restoring previous behaviour, since 
that option and the behaviour associated with it were new in 10.0p1.

openssh has pretty extensive autopkgtests.  Admittedly they didn't catch 
these issues (although I have my suspicions that the riscv64 autopkgtest 
failures that I fixed by disabling --with-linux-memlock-onfault just on 
riscv64 in 1:10.0p1-2 were in fact the canary in the coalmine), but they 
do provide decent assurance that openssh still works in general.

unblock openssh/1:10.0p1-5

Thanks,

-- 
Colin Watson (he/him)                              [cjwat...@debian.org]
diff -Nru openssh-10.0p1/debian/changelog openssh-10.0p1/debian/changelog
--- openssh-10.0p1/debian/changelog     2025-04-15 14:19:35.000000000 +0100
+++ openssh-10.0p1/debian/changelog     2025-05-09 13:40:49.000000000 +0100
@@ -1,3 +1,25 @@
+openssh (1:10.0p1-5) unstable; urgency=medium
+
+  * Ensure that configure knows the path to passwd; fixes reproducibility of
+    openssh-tests.
+
+ -- Colin Watson <cjwat...@debian.org>  Fri, 09 May 2025 13:40:49 +0100
+
+openssh (1:10.0p1-4) unstable; urgency=medium
+
+  [ Daniel Kahn Gillmor ]
+  * Add Requires=ssh-agent.socket to ssh-agent.service (closes: #1103522).
+
+ -- Colin Watson <cjwat...@debian.org>  Fri, 09 May 2025 10:16:45 +0100
+
+openssh (1:10.0p1-3) unstable; urgency=medium
+
+  * Disable --with-linux-memlock-onfault again, since it causes
+    RLIMIT_MEMLOCK to be exceeded with some combinations of PAM modules
+    (closes: #1103418).
+
+ -- Colin Watson <cjwat...@debian.org>  Wed, 07 May 2025 16:18:43 +0100
+
 openssh (1:10.0p1-2) unstable; urgency=medium
 
   [ Colin Watson ]
diff -Nru openssh-10.0p1/debian/rules openssh-10.0p1/debian/rules
--- openssh-10.0p1/debian/rules 2025-04-15 14:19:35.000000000 +0100
+++ openssh-10.0p1/debian/rules 2025-05-09 13:40:49.000000000 +0100
@@ -74,6 +74,10 @@
 confflags += ossh_cv_cflag__fzero_call_used_regs_used=no
 endif
 
+# passwd isn't otherwise needed and may not be installed at build time.
+# Ensure that sshd knows its path.
+confflags += PATH_PASSWD_PROG=/usr/bin/passwd
+
 # Everything above here is common to the deb and udeb builds.
 confflags_udeb := $(confflags)
 
@@ -88,11 +92,6 @@
 confflags += --with-selinux
 confflags += --with-audit=linux
 confflags += --with-security-key-builtin
-# On riscv64, this causes failures in ed25519-sk keytype tests, for unclear
-# reasons.
-ifneq ($(DEB_HOST_ARCH),riscv64)
-confflags += --with-linux-memlock-onfault
-endif
 endif
 
 # The deb build wants xauth; the udeb build doesn't.
diff -Nru openssh-10.0p1/debian/systemd/ssh-agent.service 
openssh-10.0p1/debian/systemd/ssh-agent.service
--- openssh-10.0p1/debian/systemd/ssh-agent.service     2025-04-15 
14:19:35.000000000 +0100
+++ openssh-10.0p1/debian/systemd/ssh-agent.service     2025-05-09 
13:40:49.000000000 +0100
@@ -1,6 +1,7 @@
 [Unit]
 Description=OpenSSH Agent
 Documentation=man:ssh-agent(1)
+Requires=ssh-agent.socket
 
 [Service]
 Environment=SSH_ASKPASS_REQUIRE=force

Reply via email to