Your message dated Mon, 21 Jul 2008 11:32:05 +0000 with message-id <E1KKtcb-0004nb-FM@ries.debian.org> and subject line Bug#484404: fixed in openssh 1:4.7p1-13 has caused the Debian Bug report #484404, regarding openssh: Update menu-item number for openssh-client-udeb to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 484404: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484404 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian BTS Submit <submit@bugs.debian.org>
- Subject: openssh: Update menu-item number for openssh-client-udeb
- From: Frans Pop <elendil@planet.nl>
- Date: Wed, 4 Jun 2008 01:35:52 +0200
- Message-id: <200806040135.53135.elendil@planet.nl>
Package: openssh Version: 1:4.7p1-12 Severity: wishlist Tags: d-i patch Since D-I's main-menu version 1.26 it will automatically not include components that have a menu-item of 99900 (deprecated) and 99999, which means that the isinstallable hack is no longer needed. Please include the attached patch in your next upload to bring openssh-client-udeb in line with the new main-menu (which is now in testing). TIA, Frans Popdiff -u openssh-4.7p1/debian/changelog openssh-4.7p1/debian/changelog --- openssh-4.7p1/debian/changelog +++ openssh-4.7p1/debian/changelog @@ -1,3 +1,10 @@ +openssh (1:4.7p1-13~fjp) UNRELEASED; urgency=low + + * Update menu-item number for Debian Installer and drop the isinstallable + file as main-menu (>= 1.26) now takes care of that. + + -- Frans Pop <fjp@debian.org> Tue, 03 Jun 2008 22:33:02 +0200 + openssh (1:4.7p1-12) unstable; urgency=low * Fill in CVE identifier for ssh-vulnkey bug fixed in 1:4.7p1-10. diff -u openssh-4.7p1/debian/control openssh-4.7p1/debian/control --- openssh-4.7p1/debian/control +++ openssh-4.7p1/debian/control @@ -100,7 +100,7 @@ Priority: optional Architecture: any Depends: ${shlibs:Depends}, libnss-files-udeb, libcrypto0.9.8-udeb (>= 0.9.8g-9) -XB-Installer-Menu-Item: 99900 +XB-Installer-Menu-Item: 99999 Description: secure shell client for the Debian installer This is the portable version of OpenSSH, a free implementation of the Secure Shell protocol as specified by the IETF secsh working diff -u openssh-4.7p1/debian/rules openssh-4.7p1/debian/rules --- openssh-4.7p1/debian/rules +++ openssh-4.7p1/debian/rules @@ -311,7 +311,6 @@ dh_compress dh_fixperms dh_installdeb - install -p -o root -g root -m 755 debian/openssh-client-udeb.isinstallable debian/openssh-client-udeb/DEBIAN/isinstallable dh_shlibdeps dh_gencontrol dh_md5sums reverted: --- openssh-4.7p1/debian/openssh-client-udeb.isinstallable +++ openssh-4.7p1.orig/debian/openssh-client-udeb.isinstallable @@ -1,10 +0,0 @@ -#! /bin/sh - -# This is a hack to arrange for openssh-client-udeb to show up as a -# retrievable debian-installer component in expert mode (due to the -# Installer-Menu-Item: control field) while not actually appearing on the -# d-i main menu. See: -# -# http://lists.debian.org/debian-boot/2004/07/msg01207.html - -exit 1Attachment: signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---
- To: 484404-close@bugs.debian.org
- Subject: Bug#484404: fixed in openssh 1:4.7p1-13
- From: Colin Watson <cjwatson@debian.org>
- Date: Mon, 21 Jul 2008 11:32:05 +0000
- Message-id: <E1KKtcb-0004nb-FM@ries.debian.org>
Source: openssh Source-Version: 1:4.7p1-13 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive: openssh-client-udeb_4.7p1-13_i386.udeb to pool/main/o/openssh/openssh-client-udeb_4.7p1-13_i386.udeb openssh-client_4.7p1-13_i386.deb to pool/main/o/openssh/openssh-client_4.7p1-13_i386.deb openssh-server-udeb_4.7p1-13_i386.udeb to pool/main/o/openssh/openssh-server-udeb_4.7p1-13_i386.udeb openssh-server_4.7p1-13_i386.deb to pool/main/o/openssh/openssh-server_4.7p1-13_i386.deb openssh_4.7p1-13.diff.gz to pool/main/o/openssh/openssh_4.7p1-13.diff.gz openssh_4.7p1-13.dsc to pool/main/o/openssh/openssh_4.7p1-13.dsc ssh-askpass-gnome_4.7p1-13_i386.deb to pool/main/o/openssh/ssh-askpass-gnome_4.7p1-13_i386.deb ssh-krb5_4.7p1-13_all.deb to pool/main/o/openssh/ssh-krb5_4.7p1-13_all.deb ssh_4.7p1-13_all.deb to pool/main/o/openssh/ssh_4.7p1-13_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 484404@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Mon, 21 Jul 2008 12:18:28 +0100 Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source all i386 Version: 1:4.7p1-13 Distribution: unstable Urgency: low Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell client, an rlogin/rsh/rcp replacement openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell server, an rshd replacement openssh-server-udeb - secure shell server for the Debian installer (udeb) ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 483756 484404 484451 485415 487325 Changes: openssh (1:4.7p1-13) unstable; urgency=low . * Add some helpful advice to the end of ssh-vulnkey's output if there are unknown or compromised keys (thanks, Dan Jacobson; closes: #483756). * Check compromised key blacklist in ssh or ssh-add, as well as in the server (LP: #232391). To override the blacklist check in ssh temporarily, use 'ssh -o UseBlacklistedKeys=yes'; there is no override for the blacklist check in ssh-add. * Add cross-references to ssh-vulnkey(1) to ssh(1), ssh-add(1), ssh-keygen(1), and sshd(8) (closes: #484451). * Change openssh-client-udeb's Installer-Menu-Item from 99900 to 99999 (thanks, Frans Pop). * Drop openssh-client-udeb isinstallable hack, as main-menu (>= 1.26) now takes care of that (thanks, Frans Pop; closes: #484404). * Update DEB_BUILD_OPTIONS parsing code from policy 3.8.0. * Add documentation on removing openssh-blacklist locally (see #484269). * Clarify documentation of SSHD_OOM_ADJUST, and make setting it to the empty string actually skip adjustment as intended (closes: #487325). * Remove empty /usr/share/applications directory in ssh-askpass-gnome. * debconf template translations: - Update Romanian (thanks, Cătălin Feștilă; closes: #485415). Checksums-Sha1: 0c795ce18a6e7485b4c3bce9d05e3c761ffddcda 1504 openssh_4.7p1-13.dsc 2e1b90897edb478a562160d4bba0e2c0343dfacf 215208 openssh_4.7p1-13.diff.gz 4969f71b147b63543c3f9963528001f5b048e4ca 1042 ssh_4.7p1-13_all.deb 6480c85a547528d8da02b2325e8235e874ab80e2 89998 ssh-krb5_4.7p1-13_all.deb 286a819a08cd55a9617ad0b4ad92d2f967c6f058 721498 openssh-client_4.7p1-13_i386.deb 2a3a28a13763aeaede074e25c7a62c564d1dc27d 261480 openssh-server_4.7p1-13_i386.deb 810635455a7d6710c1d158caa41ae9fdd43070c3 97482 ssh-askpass-gnome_4.7p1-13_i386.deb ae49e22cc231d445835b709e7910fb6ffabfc099 159502 openssh-client-udeb_4.7p1-13_i386.udeb 24e4e6ac0400c4d785397730ce9e86d7ddf4ea44 173024 openssh-server-udeb_4.7p1-13_i386.udeb Checksums-Sha256: 3570d43e2bce08bc98493f07f0954c2f9b2d04ce16d5042074fc71a63e71e8d3 1504 openssh_4.7p1-13.dsc 5c6e8695e2af17b7744479dcf1912a89e392e984c57bbd10196b8f389cc22d43 215208 openssh_4.7p1-13.diff.gz 5b4af0b0ffd314c97a35409205e9b48d97832964c2f079cedfa1c8ae93a2ffde 1042 ssh_4.7p1-13_all.deb 2565b6846d0cc9058d4088b44d0293bfd31b5eef06fdbad2e13fecefa0fed076 89998 ssh-krb5_4.7p1-13_all.deb 10e035282b8626fb11bf102ca2ddac3ec1e831f974f1e494216ce0cff2d7e6b2 721498 openssh-client_4.7p1-13_i386.deb 1669deb01ab10b3871e596c875441d6cc8da7245327250a117b5e1082b6e3366 261480 openssh-server_4.7p1-13_i386.deb 60fa7516aa2699ae2671d1c416e73c4b80410081c07157edf1621fa14112635a 97482 ssh-askpass-gnome_4.7p1-13_i386.deb 3277f7781f5a90d3603ca28cc80e7df2ff9390ff91ec39e67667b2644d486f45 159502 openssh-client-udeb_4.7p1-13_i386.udeb 1407c0b0da7e91245e3c890a4f529cb4e29f4b064ac7789c95fd87dd3311ed76 173024 openssh-server-udeb_4.7p1-13_i386.udeb Files: 77e96fe444882281deeb3f3c829602bf 1504 net standard openssh_4.7p1-13.dsc 5c1b6759596d3f583d58424e7cdf178b 215208 net standard openssh_4.7p1-13.diff.gz 345d10be6218747e5bf4108d49ce0a22 1042 net extra ssh_4.7p1-13_all.deb eb019d3eaf93276882cff336f7ae8650 89998 net extra ssh-krb5_4.7p1-13_all.deb 97801920d8ebdffbd4732a8da91eba10 721498 net standard openssh-client_4.7p1-13_i386.deb 285dcbcd52248d92af7463c715975729 261480 net optional openssh-server_4.7p1-13_i386.deb 1a36e66cdeb3d00415b756f74111646d 97482 gnome optional ssh-askpass-gnome_4.7p1-13_i386.deb c00ca8e31a567888f69a21422d2ea3bd 159502 debian-installer optional openssh-client-udeb_4.7p1-13_i386.udeb 7284a936bdf9f474aacefb4a81464d19 173024 debian-installer optional openssh-server-udeb_4.7p1-13_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iD8DBQFIhHEh9t0zAhD6TNERArXUAJ98Zh9ZHab1faqWfw+P3cNbVfaQCwCfYz7J SdXDBTGU6nuHgvwWqPKG3q0= =z89n -----END PGP SIGNATURE-----
--- End Message ---