Your message dated Tue, 15 Feb 2022 19:49:51 +0000 with message-id <E1nK3pf-0000vG-8y@fasolo.debian.org> and subject line Bug#996391: fixed in openssh 1:8.8p1-1 has caused the Debian Bug report #996391, regarding openssh: New upstream version available to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 996391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996391 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: openssh: New upstream version available
- From: Michael Prokop <mika@debian.org>
- Date: Wed, 13 Oct 2021 17:38:56 +0200
- Message-id: <2021-10-13T17-26-41@devnull.michael-prokop.at>
Package: openssh Version: 1:8.4p1-6 Severity: wishlist Hi, the current upstream version is 8.8p1 (see [1]), I'm sure that the package maintainers are aware of this, but I couldn't find any tracking bug report about this, so reporting it here. :) Given that there are plenty of new features, but also the (upcoming) deprecation of scp(1), the disabled RSA signatures using the SHA-1 hash algorithm,... it would be nice to get a more current OpenSSH version in Debian. Thanks for maintaining OpenSSH in Debian! [1] https://www.openssh.com/releasenotes.html: * OpenSSH 8.8/8.8p1 (2021-09-26) * OpenSSH 8.7/8.7p1 (2021-08-20) * OpenSSH 8.6/8.6p1 (2021-04-19) * OpenSSH 8.5/8.5p1 (2021-03-03) regards -mika-Attachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: 996391-close@bugs.debian.org
- Subject: Bug#996391: fixed in openssh 1:8.8p1-1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 15 Feb 2022 19:49:51 +0000
- Message-id: <E1nK3pf-0000vG-8y@fasolo.debian.org>
- Reply-to: Colin Watson <cjwatson@debian.org>
Source: openssh Source-Version: 1:8.8p1-1 Done: Colin Watson <cjwatson@debian.org> We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 996391@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 15 Feb 2022 19:20:21 +0000 Source: openssh Architecture: source Version: 1:8.8p1-1 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Closes: 996391 Changes: openssh (1:8.8p1-1) unstable; urgency=medium . * New upstream release (https://www.openssh.com/releasenotes.html#8.8p1, closes: #996391): - This release disables RSA signatures using the SHA-1 hash algorithm by default. (Existing RSA keys may still be used and do not need to be replaced; see NEWS.Debian if you have problems connecting to old SSH servers.) - ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs directive to accept a "none" argument to specify the default behaviour. - scp(1): when using the SFTP protocol, continue transferring files after a transfer error occurs, better matching original scp/rcp behaviour. - ssh(1): fixed a number of memory leaks in multiplexing, - ssh-keygen(1): avoid crash when using the -Y find-principals command. - A number of documentation and manual improvements. - ssh(1)/sshd(8): some fixes to the pselect(2) replacement compatibility code. * Work around missing RSA SHA-2 signature support in conch until the upstream fix lands in Debian. Checksums-Sha1: b8690cc5355e8af197b6d0c427775ad163d0a68c 3347 openssh_8.8p1-1.dsc 1eb964897a4372f6fb96c7effeb509ec71c379c9 1815060 openssh_8.8p1.orig.tar.gz 8e1d9e918be4be7ae44bbe4061adf9dc7cb915b9 833 openssh_8.8p1.orig.tar.gz.asc c0da03480c1669c204ebb903bc930c6f93a8b863 185620 openssh_8.8p1-1.debian.tar.xz Checksums-Sha256: a67428df6bfd167e59793c9572c8a5a9a603adc552fb72b2e5ac4d469c3e6c30 3347 openssh_8.8p1-1.dsc 4590890ea9bb9ace4f71ae331785a3a5823232435161960ed5fc86588f331fe9 1815060 openssh_8.8p1.orig.tar.gz eb930fe3a4f745021e61168f318ac4913658e0669c3249ab0d731b198660b0df 833 openssh_8.8p1.orig.tar.gz.asc 59c283f39621ee09fe4caa4d80c6b8bc18bb439c79b9a37556d84569fd115e9d 185620 openssh_8.8p1-1.debian.tar.xz Files: 1c786540da9a891f93791ee5f079e368 3347 net standard openssh_8.8p1-1.dsc 8ce5f390958baeeab635aafd0ef41453 1815060 net standard openssh_8.8p1.orig.tar.gz 5a276debc9e28185a0cdb04e066c27bf 833 net standard openssh_8.8p1.orig.tar.gz.asc 50be1aa8aef38b4e0a3f3cf77ee6cfcb 185620 net standard openssh_8.8p1-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmIL/TcACgkQOTWH2X2G UAtFDQ//WqlSflwHFuQ1S64Utmtje2qGOndObNnsVypOPMWslkbreQroNJGvVb5a n2e55enjjq4pocIfq7DmqOPnwgSjE4AN+Pt1HZh/WCedQOE8sPPSzcqaJfmbed3i aaYc44bXVWbWSgeZrmvXoOkdHc/126U3MgTcqtJjHOFolm0hO63tcpfIGmTotX2n kfLvKw2UNIKVywBtzUg/ETKvS7grTvt+pYl2Ty8UyOWe2yU6stikdnfLcFTLzIrA 4H1cFVFUwM4R7/6JyCOh94DUB170ywGcyetl8jHvdnnSinBkucAYh8lEwdZQMXjD oCf6aWWh7o51qiv/fadHFKK9jG9wqQBDUazRHFMGiBhIvXpmQhC7zA7ckGt6+BDL gl07uygF89cR+xYXmwiNaT/cw7qRHhjUdG83CbLIs1tSMENo+Ehkz7Y53MXPBXfd pT7GMDbXP/a6yc/jRf35eVnebRmCRhyy93xqIVokvHaLmFvTkA6Dlip1WZLHpV6h IlhgOYcQrqoOPOpUn/yjoREeKMM7jnBP9vOS6GEDnyJNVmxK7b+gEeXYgDXeB52f FVPcgNSJqmW0t5c/YjBp2ncK2MD2Ln06ZbXEyskjCYG/C9Qtss6iWxpyBzL2HEu2 CF0BRkRDNRX+lK0hBbuLhG9jtUbVwvM8p/mI+eLzLc7ZH2bKO2k= =3WNo -----END PGP SIGNATURE-----
--- End Message ---