Accepted xinetd 1:2.3.15-3~bpo60+1 (source amd64)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 20 Mar 2014 18:57:29 +0100
Source: xinetd
Binary: xinetd
Architecture: source amd64
Version: 1:2.3.15-3~bpo60+1
Distribution: squeeze-backports-sloppy
Urgency: high
Maintainer: Salvo 'LtWorf' Tomaselli <tiposchi@tiscali.it>
Changed-By: Florian Schlichting <fsfs@debian.org>
Description:
xinetd - replacement for inetd with many enhancements
Closes: 129086 324678 526923 527887 542729 611637 644515 661881 672381 673531 727277
Changes:
xinetd (1:2.3.15-3~bpo60+1) squeeze-backports-sloppy; urgency=medium
.
* Rebuild for squeeze-backports-sloppy.
* Lower dh compat to 8
* Do not store pidfile in /run on squeeze
.
xinetd (1:2.3.15-3) unstable; urgency=low
.
* Add lintian override for script-with-language-extension.
* "service xinetd status" shows the status of all the services as well.
* Update config.{sub,guess} for AArch64. (Closes: #727277)
.
xinetd (1:2.3.15-2) unstable; urgency=high
.
* Fix CVE-2013-4342 making TCPMUX services change the uid.
(Closes: #324678)
.
xinetd (1:2.3.15-1) unstable; urgency=low
.
* New upstream release. (Closes: #673531)
* Drop all patches that were included upstream.
* Store pidfile in /run rather than /var/run.
* Use pidfile for start-stop-daemon.
(Closes: #644515, #129086) (LP: #868538)
* Port patch on 000008-fix-manpages to work on the new
upstream version.
.
xinetd (1:2.3.14-10) unstable; urgency=low
.
* Upload to unstable.
* Bump Standards-version to 3.9.4.
* Use automatic doc-base rather than install it with
xinetd.install.
.
xinetd (1:2.3.14-9~exp1) experimental; urgency=low
.
* Add $network in the LSB headers for the init script.
* Add description in the LSB headers
* Update LSB headers to indicate as providing itself and
as replacement for inetd.
* Fix a typo and some warnings in man pages (patch in 000008-fix-manpages).
* Add debian/watch file.
* Register the faq html file with doc-base.
* Add more details to the previous changelog entry.
* Use correct debhelper version in the Build-Deps: 9 instead of 9.0.0.
* Add DEP-3 headers to the 000007-CVE-2012-0862 patch.
* Remove extra whitespace from debian/xinet.d/*.
* Wrap debian/rules to 80 columns.
.
xinetd (1:2.3.14-8~exp1) experimental; urgency=low
.
* New maintainer. (Closes: #661881)
* Explicit switch to quilt, instead of hand made patch management.
* Correct typo in README.Debian. (Closes: #611637)
* Add status action in init.d. (Closes: #527887)
* Defaults to rsyslog. (Closes: #526923)
* Fix lintian warnings about missing recommended target.
* Fix lintian warning maintainer-script-without-set-e.
* New and simplified debian/rules using dh.
* Let the scripts be generated automatically.
* Use the debian way for patches.
* Bump to latest Standards-Version.
* Depend on debhelper 9.
* Replace package VCS-* fields with new URL.
* Bump compatibility level in debian/compat to 9. (Closes: #542729)
.
xinetd (1:2.3.14-7.1) unstable; urgency=high
.
* Non-maintainer upload.
* Fix CVE-2012-0862 avoiding enabling unintentional services.
(Closes: #672381)
Checksums-Sha1:
46fa266cf71f97c24e4eb60d8e27306a7ca98d98 1830 xinetd_2.3.15-3~bpo60+1.dsc
0232a61290a4ee55f1a5fbbdd81b786687b5a43a 26083 xinetd_2.3.15-3~bpo60+1.debian.tar.gz
5e8d0e63861483957165a8037f9512f206f1d061 149118 xinetd_2.3.15-3~bpo60+1_amd64.deb
Checksums-Sha256:
78afa106e5025a89b0d920a024fbd709ec26f776de82f3ed581ba88e2e22a682 1830 xinetd_2.3.15-3~bpo60+1.dsc
f442005be86905205156e849d6b80a9a9c9747e8ae3072982b66f0aa739c35be 26083 xinetd_2.3.15-3~bpo60+1.debian.tar.gz
869b04962477aa35fa1f9896fd2cc145e4e36d34da26203bc3eb8e20adaba30f 149118 xinetd_2.3.15-3~bpo60+1_amd64.deb
Files:
43c4088f9a80919472170913fdb2e4f0 1830 net extra xinetd_2.3.15-3~bpo60+1.dsc
3ec526c4e6ad7fb7166f05b0b6e37d13 26083 net extra xinetd_2.3.15-3~bpo60+1.debian.tar.gz
a6c04437bc554b00f5e16a1e406a18be 149118 net extra xinetd_2.3.15-3~bpo60+1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCAAGBQJTpJ0MAAoJEBKXO25y3Ae1t4UQAIGv0Al0IZrlMoBE9bNQefSG
DGgAFZOymwZxPW5FN0zqeg22NdS2Gbml80sgp1QDI8Raeu2cLfEPGS/5ZZc4C51z
iUQ4AbXyUygxZ6FSrgJdhocbrEfv2UaV29YWPdYwWdOuvUnTcgiidAzVHQHUL+rN
2jlW2a1v5eEKE9SVe87YhEPdmc1jERAc4qd8W/2TkpFlELIpfW99dF3MjcUl8Gja
srHvRyCBiFQ6thERYJYvrgrGQqYEaOFdDv7wziUNf/fC5xPyIuH772SemgDKeVmS
1W+WZ9ljET9FQA8+8tMDSPNaitq6/fQ+2Avj6YhMi0w+r98hRSey0K4bG/n6urVi
WcouD6TC2wVnMsYiZ4Rw15Cxw18B2EtNZtKQ94Qhp1pigYBzWszyoDTV8Qalm5fG
635BsjKI+vUsiIp2kNtyhizPF8WnyQHXexHyjLe+MyihmsfWmC686ww2hd4KtirT
nF7rTK0A3cD4kJH3cyUKTNyKlJtoerxw/Ln1X+MMoAQQZgptJxsBwdxInheiaKyS
QDsivyBEpNX3JE579TiYbm2xOw5G8cEubcFddA9LXvtz7wYuo1sxNrbN7NCiN8vt
pho7XUXKyuDW7tSVonRK2VZSU5jtoG44JThBUm40wp2BlDAppK2VAtiIOwnvveGk
Mw3hxxSIFoQsrQscLSbL
=G1NL
-----END PGP SIGNATURE-----
Reply to: