[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

bug#61242: closed ([PATCH] gnu: openssh: Update to 9.2p1)

From: GNU bug Tracking System
Subject: bug#61242: closed ([PATCH] gnu: openssh: Update to 9.2p1)
Date: Sat, 04 Feb 2023 11:14:02 +0000

Your message dated Sat, 4 Feb 2023 12:13:33 +0100
with message-id <Y9493epd57nZ/oYx@jasmine.lan>
and subject line Re: [bug#61242] [PATCH] gnu: openssh: Update to 9.2p1
has caused the debbugs.gnu.org bug report #61242,
regarding [PATCH] gnu: openssh: Update to 9.2p1
to be marked as done.

(If you believe you have received this mail in error, please contact

61242: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=61242
GNU Bug Tracking System
Contact help-debbugs@gnu.org with problems
--- Begin Message --- Subject: [PATCH] gnu: openssh: Update to 9.2p1 Date: Thu, 2 Feb 2023 18:08:32 -0500
* gnu/packages/ssh.scm (openssh): Update to 9.2p1.

This release has some security fixes [0]. I did a test build on x86-64
linux and didn't see anything unusual in the build log.

[0] https://www.openssh.com/txt/release-9.2

 gnu/packages/ssh.scm | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/gnu/packages/ssh.scm b/gnu/packages/ssh.scm
index 35b3b378a9..685b5b039a 100644
--- a/gnu/packages/ssh.scm
+++ b/gnu/packages/ssh.scm
@@ -186,7 +186,7 @@ (define-public libssh2
 (define-public openssh
    (name "openssh")
-   (version "9.1p1")
+   (version "9.2p1")
    (source (origin
              (method url-fetch)
              (uri (string-append "mirror://openbsd/OpenSSH/portable/"
@@ -195,7 +195,7 @@ (define-public openssh
-               "126jzn5pxkf1dgzcb3lzpzab8airg0avnvr3y23kgqp3qw4m1y0r"))))
+               "0ingf6fxzg2fcf6k68bvh0lc460jn0macvf5w585zd2zcpqxnriz"))))
    (build-system gnu-build-system)
    (native-inputs (list groff pkg-config))
    (inputs `(("libedit" ,libedit)

--- End Message ---
--- Begin Message --- Subject: Re: [bug#61242] [PATCH] gnu: openssh: Update to 9.2p1 Date: Sat, 4 Feb 2023 12:13:33 +0100
On Fri, Feb 03, 2023 at 05:13:27PM -0500, Jack Hill wrote:
> I had a chance today to reconfigure a host with the new ssh server. After
> reconfigure, I ran `sudo herd restart ssh-daemon` just to be sure.
> I was able to connect over IPv6 with both the old and new client. The only
> authentication method tested was ssh-keys of type ed25519. All x86-64. No
> other fancy ssh features other than getting a shell were tested.

Thanks for testing!

Pushed as 36b8624dab8f881b65becee4a1603f9fbfd8094f

--- End Message ---

reply via email to

[Prev in Thread] Current Thread [Next in Thread]