[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#996391: marked as done (openssh: New upstream version available)



Your message dated Tue, 15 Feb 2022 19:49:51 +0000
with message-id <E1nK3pf-0000vG-8y@fasolo.debian.org>
and subject line Bug#996391: fixed in openssh 1:8.8p1-1
has caused the Debian Bug report #996391,
regarding openssh: New upstream version available
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
996391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996391
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh
Version: 1:8.4p1-6
Severity: wishlist

Hi,

the current upstream version is 8.8p1 (see [1]), I'm sure that
the package maintainers are aware of this, but I couldn't find any
tracking bug report about this, so reporting it here. :)

Given that there are plenty of new features, but also the (upcoming)
deprecation of scp(1), the disabled RSA signatures using the SHA-1
hash algorithm,... it would be nice to get a more current OpenSSH
version in Debian.

Thanks for maintaining OpenSSH in Debian!

[1] https://www.openssh.com/releasenotes.html:
* OpenSSH 8.8/8.8p1 (2021-09-26)
* OpenSSH 8.7/8.7p1 (2021-08-20)
* OpenSSH 8.6/8.6p1 (2021-04-19)
* OpenSSH 8.5/8.5p1 (2021-03-03)

regards
-mika-

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:8.8p1-1
Done: Colin Watson <cjwatson@debian.org>

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 996391@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 15 Feb 2022 19:20:21 +0000
Source: openssh
Architecture: source
Version: 1:8.8p1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 996391
Changes:
 openssh (1:8.8p1-1) unstable; urgency=medium
 .
   * New upstream release (https://www.openssh.com/releasenotes.html#8.8p1,
     closes: #996391):
     - This release disables RSA signatures using the SHA-1 hash algorithm by
       default.  (Existing RSA keys may still be used and do not need to be
       replaced; see NEWS.Debian if you have problems connecting to old SSH
       servers.)
     - ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs directive
       to accept a "none" argument to specify the default behaviour.
     - scp(1): when using the SFTP protocol, continue transferring files
       after a transfer error occurs, better matching original scp/rcp
       behaviour.
     - ssh(1): fixed a number of memory leaks in multiplexing,
     - ssh-keygen(1): avoid crash when using the -Y find-principals command.
     - A number of documentation and manual improvements.
     - ssh(1)/sshd(8): some fixes to the pselect(2) replacement compatibility
       code.
   * Work around missing RSA SHA-2 signature support in conch until the
     upstream fix lands in Debian.
Checksums-Sha1:
 b8690cc5355e8af197b6d0c427775ad163d0a68c 3347 openssh_8.8p1-1.dsc
 1eb964897a4372f6fb96c7effeb509ec71c379c9 1815060 openssh_8.8p1.orig.tar.gz
 8e1d9e918be4be7ae44bbe4061adf9dc7cb915b9 833 openssh_8.8p1.orig.tar.gz.asc
 c0da03480c1669c204ebb903bc930c6f93a8b863 185620 openssh_8.8p1-1.debian.tar.xz
Checksums-Sha256:
 a67428df6bfd167e59793c9572c8a5a9a603adc552fb72b2e5ac4d469c3e6c30 3347 openssh_8.8p1-1.dsc
 4590890ea9bb9ace4f71ae331785a3a5823232435161960ed5fc86588f331fe9 1815060 openssh_8.8p1.orig.tar.gz
 eb930fe3a4f745021e61168f318ac4913658e0669c3249ab0d731b198660b0df 833 openssh_8.8p1.orig.tar.gz.asc
 59c283f39621ee09fe4caa4d80c6b8bc18bb439c79b9a37556d84569fd115e9d 185620 openssh_8.8p1-1.debian.tar.xz
Files:
 1c786540da9a891f93791ee5f079e368 3347 net standard openssh_8.8p1-1.dsc
 8ce5f390958baeeab635aafd0ef41453 1815060 net standard openssh_8.8p1.orig.tar.gz
 5a276debc9e28185a0cdb04e066c27bf 833 net standard openssh_8.8p1.orig.tar.gz.asc
 50be1aa8aef38b4e0a3f3cf77ee6cfcb 185620 net standard openssh_8.8p1-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmIL/TcACgkQOTWH2X2G
UAtFDQ//WqlSflwHFuQ1S64Utmtje2qGOndObNnsVypOPMWslkbreQroNJGvVb5a
n2e55enjjq4pocIfq7DmqOPnwgSjE4AN+Pt1HZh/WCedQOE8sPPSzcqaJfmbed3i
aaYc44bXVWbWSgeZrmvXoOkdHc/126U3MgTcqtJjHOFolm0hO63tcpfIGmTotX2n
kfLvKw2UNIKVywBtzUg/ETKvS7grTvt+pYl2Ty8UyOWe2yU6stikdnfLcFTLzIrA
4H1cFVFUwM4R7/6JyCOh94DUB170ywGcyetl8jHvdnnSinBkucAYh8lEwdZQMXjD
oCf6aWWh7o51qiv/fadHFKK9jG9wqQBDUazRHFMGiBhIvXpmQhC7zA7ckGt6+BDL
gl07uygF89cR+xYXmwiNaT/cw7qRHhjUdG83CbLIs1tSMENo+Ehkz7Y53MXPBXfd
pT7GMDbXP/a6yc/jRf35eVnebRmCRhyy93xqIVokvHaLmFvTkA6Dlip1WZLHpV6h
IlhgOYcQrqoOPOpUn/yjoREeKMM7jnBP9vOS6GEDnyJNVmxK7b+gEeXYgDXeB52f
FVPcgNSJqmW0t5c/YjBp2ncK2MD2Ln06ZbXEyskjCYG/C9Qtss6iWxpyBzL2HEu2
CF0BRkRDNRX+lK0hBbuLhG9jtUbVwvM8p/mI+eLzLc7ZH2bKO2k=
=3WNo
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: