[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted nsd 4.3.5-1~bpo10+1 (source amd64) into buster-backports->backports-policy, buster-backports



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 05 May 2021 20:49:13 +0200
Source: nsd
Binary: nsd nsd-dbgsym
Architecture: source amd64
Version: 4.3.5-1~bpo10+1
Distribution: buster-backports
Urgency: medium
Maintainer: nsd packagers <nsd@packages.debian.org>
Changed-By: Markus Schade <markus.schade@gmail.com>
Description:
 nsd        - authoritative domain name server
Closes: 803683 931476 935418 978872
Changes:
 nsd (4.3.5-1~bpo10+1) buster-backports; urgency=medium
 .
   * Rebuild for buster-backports
 .
 nsd (4.3.5-1) unstable; urgency=medium
 .
   * New upstream version 4.3.5 (Closes: #978872)
 .
 nsd (4.3.4-1) unstable; urgency=medium
 .
   * New upstream version 4.3.4
   * Fixes CVE-2020-28935 (chown of pidfile) on systems with sysvinit
 .
 nsd (4.3.3-1) unstable; urgency=medium
 .
   * New upstream version 4.3.3
   * Run systemd service without creating pidfile
 .
 nsd (4.3.2-1) unstable; urgency=medium
 .
   * New upstream version 4.3.2
   * Use new log-only-syslog: yes (Closes: #803683)
   * Drop FTBFS patches included upstream
   * Update to debhelper 13
 .
 nsd (4.3.1-1) unstable; urgency=medium
 .
   * New upstream version 4.3.1
   * Update URLs in upstream metadata
   * Add upstream patch to fix return code in nsd-control-setup
   * Drop previously included FTBFS patch for missing headers
   * Refresh enable control by default patch
   * Add new FTBFS patch to remove test target depending on excluded files in
     upstream tarball
 .
 nsd (4.3.0-1) unstable; urgency=medium
 .
   * New upstream version 4.3.0
   * Update standards version to 4.5.0
   * Correct typo (mount/@mount) in nsd.service SystemCallFilter list
   * Add upstream patch to include missing headers file to fix FTBFS
 .
 nsd (4.2.4-1) unstable; urgency=medium
 .
   * New upstream version 4.2.4
     Closes: #935418 (new upstream version)
     Closes: #931476, CVE-2019-13207 (Overflow in dname_concatenate() function)
   * Update standards version to 4.4.1
   * Update to debhelper 12
   * Enable per zone stats (feature present since 4.1.4)
   * Update from versions <4 are no longer supported
Checksums-Sha1:
 4255b8c14bdd165bbcad23d079e4237b9ce3655e 2058 nsd_4.3.5-1~bpo10+1.dsc
 7965bc3c92712a413198fca726627b356a501538 18312 nsd_4.3.5-1~bpo10+1.debian.tar.xz
 916db09b4429bfecfbf7ce9943ebdf63a4a5171f 1860808 nsd-dbgsym_4.3.5-1~bpo10+1_amd64.deb
 f3fe523450d5bd516120c2311fd8bc1a6e37d120 6137 nsd_4.3.5-1~bpo10+1_amd64.buildinfo
 6718993479e4350d20d75c6e082d96b069b1e7ad 486564 nsd_4.3.5-1~bpo10+1_amd64.deb
Checksums-Sha256:
 fcfcd80ac7b05493e28c86cd6464bd0757d9469364560f1ff3f29d7854679647 2058 nsd_4.3.5-1~bpo10+1.dsc
 d63e6ce6943a43ab9d1367bdda3d971be6b117d5b7ede6453b171e9a8a5c8e39 18312 nsd_4.3.5-1~bpo10+1.debian.tar.xz
 74fd52ce792b623c4a81cefaaf142ab4bc50325ad92718955f31f57f09f78107 1860808 nsd-dbgsym_4.3.5-1~bpo10+1_amd64.deb
 8239f45d27a6db31e125e50f8acaf4cefabc91454ad303cea880d60e94e9d7f8 6137 nsd_4.3.5-1~bpo10+1_amd64.buildinfo
 b4f78835314e7c663fa4c97360d6c426a2bc9fda892a6a1a87cd75668d932508 486564 nsd_4.3.5-1~bpo10+1_amd64.deb
Files:
 e23f3cc2fdb5614bff0c57ab9a1e9ef7 2058 net optional nsd_4.3.5-1~bpo10+1.dsc
 262d8ce46e48ae0e54a919c0ca6dacac 18312 net optional nsd_4.3.5-1~bpo10+1.debian.tar.xz
 17788180d70dd3c9a763b3bd4fb70f97 1860808 debug optional nsd-dbgsym_4.3.5-1~bpo10+1_amd64.deb
 eeb66d3e294046ca39a948c164c2a0aa 6137 net optional nsd_4.3.5-1~bpo10+1_amd64.buildinfo
 5b99b2fff1bc8c5b1a2f8913a5714641 486564 net optional nsd_4.3.5-1~bpo10+1_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQFIBAEBCgAyFiEEmUFc4ZBdDlWp+IAmhgt/uzL4EZ0FAmCVJxsUHHNpbW9uQGpv
c2Vmc3Nvbi5vcmcACgkQhgt/uzL4EZ1lfgf9Hoz52GZeCfzO03Zr2f5O57cgX1uB
RD4SxTbhHCAsuWTw3K6Jx4QfA2oyL4R0Vyzs/IeSjBWupzCN5oT9lIhmdswqZM9O
D7Sj6UPWopLVLb6SOAL8LownnPx5Z9faMUDyo3RyjzrOv3K5AxkE6A6mh6+HVsdE
O5bFREhEJxCEXjiWAxUXz8IT4+JObm9B6PMP6GupYKsm+buwCYP51rZsXzxCW21r
2cwXcMC3kaY18q3B8BZilsmx79TwNFbNeJVHA3VjlOVIbQ5LIKP1/5HOLfl+5PME
BJUFPLrhQZFvIIvngs9LlAGCxym7QChOqUV5cWDMdpRyNbG7fW/5jsOY9w==
=rqzH
-----END PGP SIGNATURE-----


Reply to: