diff options
author | Guillem Jover <guillem@hadrons.org> | 2012-01-01 06:26:05 +0100 |
---|---|---|
committer | Guillem Jover <guillem@hadrons.org> | 2012-01-01 06:26:05 +0100 |
commit | adf353076baa629d88544067ef15ac9302c83172 (patch) | |
tree | 90df3320939271a2b6c18ffde561b60fcb15a792 /debian/changelog | |
parent | 65e19bb2beae23acf08de130fb2a3e343eb1544c (diff) | |
download | inetutils-adf353076baa629d88544067ef15ac9302c83172.tar.gz |
New upstream release 1.9
Implement ”ping -W linger”. (Closes: #566845)
Pass “-Im4 -Iam” to autoreconf call in debian/rules.
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 6552da2..ce4b812 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,25 @@ +inetutils (2:1.9-1) UNRELEASED; urgency=low + + * New upstream release. + - Implement ”ping -W linger”. (Closes: #566845) + - debian/patches/99_CVE-2011-4862.patch: Remove, merged upstream. + - debian/patches/02_remove_unused_opie_check.patch: Likewise. + - debian/patches/60_inetd_support_argless_services.patch: Likewise. + - debian/patches/61_inetd_listen_on_tcpmux_ports.patch: Likewise. + - debian/patches/63_inetd_ipv6_sockaddrlen.patch: Likewise. + - debian/patches/64_telnetd_ipv6_sockaddrlen.patch: Likewise. + - debian/patches/72_traceroute_fix_setsockopt.patch: Likewise. + - debian/patches/01_disable_useless_man_pages.patch: Refreshed. + - debian/patches/03_reduce_shared_lib_depends.patch: Likewise. + - debian/patches/22_syslogd_conf.patch: Likewise. + - debian/patches/50_split_load_conffile.patch: Likewise. + - debian/patches/51_add_load_confdir_support.patch: Likewise. + - debian/patches/62_inetd_change_ipv6_protocol_semantics.patch: Likewise. + - debian/patches/70_ftbfs_non-linux.patch: Likewise. + * Pass “-Im4 -Iam” to autoreconf call in debian/rules. + + -- Guillem Jover <guillem@debian.org> Sun, 01 Jan 2012 04:34:04 +0100 + inetutils (2:1.8-6) unstable; urgency=high * Fix buffer overflow in telnetd allowing remote attackers to execute |