Your message dated Mon, 20 Oct 2025 11:34:57 +0000
with message-id <[email protected]>
and subject line Bug#1102458: fixed in netkit-telnet-ssl 0.17.41+really0.17-7
has caused the Debian Bug report #1102458,
regarding netkit-telnet-ssl uselessly links -lcrypt
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1102458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102458
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: netkit-telnet-ssl
Version: 0.17.41+really0.17-7
Tags: patch
User: [email protected]
Usertags: libcrypt-unused

netkit-telnet-ssl links -lcrypt into telnetd without using any of its 
symbols. As we consider dropping libcrypt-dev from build-essential, this 
may cause a FTBFS. Consider dropping the unnecessary linkage already.

Helmut
--- netkit-telnet-ssl-0.17.41+really0.17.orig/telnetd/CMakeLists.txt
+++ netkit-telnet-ssl-0.17.41+really0.17/telnetd/CMakeLists.txt
@@ -34,7 +34,6 @@
     util
     ssl
     crypto
-    crypt
     libtelnet
 )
 install(

--- End Message ---
--- Begin Message ---
Source: netkit-telnet-ssl
Source-Version: 0.17.41+really0.17-7
Done: Santiago Vila <[email protected]>

We believe that the bug you reported is fixed in the latest version of
netkit-telnet-ssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Santiago Vila <[email protected]> (supplier of updated netkit-telnet-ssl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 20 Oct 2025 12:40:00 +0200
Source: netkit-telnet-ssl
Architecture: source
Version: 0.17.41+really0.17-7
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <[email protected]>
Changed-By: Santiago Vila <[email protected]>
Closes: 1097451 1102458
Changes:
 netkit-telnet-ssl (0.17.41+really0.17-7) unstable; urgency=medium
 .
   * QA upload.
 .
   [ Santiago Vila ]
   * Refresh all patches to remove fuzzyness.
   * Use https in Bug-Debian fields.
   * Build using C17 standard with GNU extensions. Closes: #1097451.
   * Drop "Rules-Requires-Root: no" (default).
   * Update source lintian overrides.
   * Update standards-version.
 .
   [ Helmut Grohne ]
   * Do not link with -lcrypt. Closes: #1102458.
Checksums-Sha1:
 5dc75f68fa9927c3670f00331c09aba06cb869f8 1703 
netkit-telnet-ssl_0.17.41+really0.17-7.dsc
 65adca6a63359011f5e876b32540e20810d9affd 87568 
netkit-telnet-ssl_0.17.41+really0.17-7.debian.tar.xz
 17a2cd52d8e484b3f78e32420b00a1cc13c193fe 6403 
netkit-telnet-ssl_0.17.41+really0.17-7_source.buildinfo
Checksums-Sha256:
 bdbfa0e007a793b0fbd33c17b4d9f960c11dac79c763ff8be0b7d4764a8f733b 1703 
netkit-telnet-ssl_0.17.41+really0.17-7.dsc
 946f24cf19cdfb08ed0162581ae446a3c144a5f42d620c84e8031f5bea3196dc 87568 
netkit-telnet-ssl_0.17.41+really0.17-7.debian.tar.xz
 06a91844849459ee85866638c77c0e90fe1dd53bba8d1a97de35b1a2f7f9560c 6403 
netkit-telnet-ssl_0.17.41+really0.17-7_source.buildinfo
Files:
 8ddce0c332c0a2d6d2bbbd0aad6b472a 1703 net optional 
netkit-telnet-ssl_0.17.41+really0.17-7.dsc
 1602d777d7f74c154eb23385be996486 87568 net optional 
netkit-telnet-ssl_0.17.41+really0.17-7.debian.tar.xz
 187d03a015789627450142ad4737fc3f 6403 net optional 
netkit-telnet-ssl_0.17.41+really0.17-7_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEE1Uw7+v+wQt44LaXXQc5/C58bizIFAmj2GKwACgkQQc5/C58b
izLk2Af+Ir9HreRel8gkcL+6IPBnDpGNzzqa+pRbOJ6nJZb7LJrTfkHbBhbU7CUT
Am6md7GIr1BMQsOwc+L4jvaPwlGF5oBYbyAmUF4vMDPIJWW3az/WPqyzNohnU5VK
dpTikwZOwvyciUM4g6ZsIGlJdr432qrZEOYgcahoYXoVQg1qft88Oyjf4gkHMO7v
zMnEOmVTQwyAvpQjMpprVXfc+iDarJCcqR5+VljlDuMPyOeHgw0w9s82K3kBAvlS
ElP62NblzrsEs19EDM9rmKGgF3/G9761cWDXJhD/FI+r7rTq5eDfoOnLfnb+pIWm
MLgmOAgmXrdBaU+aO0JnfVwNr9AApg==
=Rdpj
-----END PGP SIGNATURE-----

Attachment: pgpGQSwmWR1AN.pgp
Description: PGP signature


--- End Message ---

Reply via email to