[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#869920: marked as done (stretch-pu: package whois/5.2.17+deb9u1)



Your message dated Sat, 07 Oct 2017 11:33:55 +0100
with message-id <1507372435.18586.64.camel@adam-barratt.org.uk>
and subject line Closing bugs for 9.2 point release
has caused the Debian Bug report #869920,
regarding stretch-pu: package whois/5.2.17+deb9u1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
869920: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869920
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian.org@packages.debian.org
Usertags: pu

ICANN mandated a whois output change that broke the .com, .net, .jobs, 
.bz, .cc and .tv gTLDs, so we need a stable update.
At the same time I would also like to fix support for 6to4 IP addresses, 
which I forgot to upload in time for the release.
The other changes are just database updates.


diff -Nru whois-5.2.15/debian/changelog whois-5.2.17+deb9u1/debian/changelog
--- whois-5.2.15/debian/changelog	2017-02-27 00:37:41.000000000 +0100
+++ whois-5.2.17+deb9u1/debian/changelog	2017-07-27 17:45:04.000000000 +0200
@@ -1,3 +1,32 @@
+whois (5.2.17+deb9u1) unstable; urgency=high
+
+  * Rebuilt for stretch.
+
+ -- Marco d'Itri <md@linux.it>  Thu, 27 Jul 2017 17:45:04 +0200
+
+whois (5.2.17) unstable; urgency=high
+
+  * Fixed whois referrals for .com, .net, .jobs, .bz, .cc and .tv, broken
+    by an ICANN-mandated output change:
+    https://www.icann.org/resources/pages/rdds-labeling-policy-2017-02-01-en
+  * Added the .xn--2scrj9c (ಭಾರತ, India), .xn--3hcrj9c (ଭାରତ, India),
+    .xn--45br5cyl (ভাৰত, India), .xn--h2breg3eve (भारतम्, India),
+    .xn--h2brj9c8c (भारोत, India), .xn--mgbbh1a (ﺏﺍﺮﺗ, India),
+    .xn--mgbgu82a (ڀﺍﺮﺗ, India) and .xn--rvc1e0am3e (ഭാരതം, India)
+    TLD servers.
+  * Updated the list of new gTLDs.
+  * whois.1: fixed a typo. (Closes: #866742)
+
+ -- Marco d'Itri <md@linux.it>  Thu, 27 Jul 2017 17:08:47 +0200
+
+whois (5.2.16) unstable; urgency=medium
+
+  * Fixed parsing of 6to4 addresses broken in 5.2.15.
+  * Updated the .do TLD server.
+  * Updated the list of new gTLDs.
+
+ -- Marco d'Itri <md@linux.it>  Mon, 13 Mar 2017 01:40:38 +0100
+
 whois (5.2.15) unstable; urgency=medium
 
   * Updated the .gf and .mq TLD servers.
diff -Nru whois-5.2.15/new_gtlds_list whois-5.2.17+deb9u1/new_gtlds_list
--- whois-5.2.15/new_gtlds_list	2017-02-27 00:37:41.000000000 +0100
+++ whois-5.2.17+deb9u1/new_gtlds_list	2017-07-27 17:44:55.000000000 +0200
@@ -60,6 +60,7 @@
 app
 apple
 aquarelle
+arab
 aramco
 archi
 army
@@ -333,6 +334,7 @@
 esq
 estate
 esurance
+etisalat
 eurovision
 eus
 events
@@ -446,6 +448,7 @@
 gratis
 green
 gripe
+grocery
 group
 guardian
 gucci
@@ -487,6 +490,7 @@
 hosting
 hot
 hoteles
+hotels
 hotmail
 house
 how
@@ -635,6 +639,7 @@
 man
 management
 mango
+map
 market
 marketing
 markets
@@ -655,6 +660,7 @@
 men
 menu
 meo
+merckmsd
 metlife
 miami
 microsoft
@@ -768,6 +774,7 @@
 pet
 pfizer
 pharmacy
+phd
 philips
 phone
 photo
@@ -855,6 +862,7 @@
 rogers
 room
 rsvp
+rugby
 ruhr
 run
 rwe
@@ -890,6 +898,7 @@
 scjohnson
 scor
 scot
+search
 seat
 secure
 security
@@ -1169,6 +1178,7 @@
 xn--kput3i
 xn--mgba3a3ejt
 xn--mgba7c0bbn0a
+xn--mgbaakc7dvf
 xn--mgbab2bd
 xn--mgbb9fbpob
 xn--mgbca7dzdo
@@ -1178,6 +1188,7 @@
 xn--mxtq1m
 xn--ngbc5azd
 xn--ngbe9e0a
+xn--ngbrx
 xn--nqv7f
 xn--nqv7fs00ema
 xn--nyqy26a
diff -Nru whois-5.2.15/tld_serv_list whois-5.2.17+deb9u1/tld_serv_list
--- whois-5.2.15/tld_serv_list	2017-02-27 00:37:41.000000000 +0100
+++ whois-5.2.17+deb9u1/tld_serv_list	2017-07-27 17:44:55.000000000 +0200
@@ -127,7 +127,7 @@
 .dj	WEB http://www.nic.dj/whois.php
 .dk	whois.dk-hostmaster.dk
 .dm	whois.nic.dm
-.do	WEB http://www.nic.do/whois-h.php3
+.do	whois.nic.do
 .dz	whois.nic.dz
 .ec	whois.nic.ec
 .ee	whois.tld.ee
@@ -183,7 +183,7 @@
 .jo	WEB http://www.dns.jo/Whois.aspx
 .jp	whois.jprs.jp
 .ke	whois.kenic.or.ke
-.kg	whois.domain.kg
+.kg	whois.kg
 .kh	NONE		# http://www.trc.gov.kh/index.php/en/newsCategory/view?id=42&detail_id=68
 .ki	whois.nic.ki
 .km	NONE		# www.domaine.km
@@ -349,7 +349,10 @@
 
 # AW means that I had to guess the whois server name, but I was not able
 # to find any registered subdomains to verify it.
+.xn--2scrj9c		whois.inregistry.net	# India
 .xn--3e0b707e		whois.kr		# Korea, Republic of
+.xn--3hcrj9c		whois.inregistry.net	# India
+.xn--45br5cyl		whois.inregistry.net	# India
 .xn--45brj9c		whois.inregistry.net	# India, Bengali AW
 .xn--54b7fta0cc		NONE			# Bangladesh
 .xn--80ao21a		whois.nic.kz		# Kazakhstan
@@ -364,6 +367,8 @@
 .xn--fpcrj9c3d		whois.inregistry.net	# India, Telugu AW
 .xn--fzc2c9e2c		whois.nic.lk		# Sri Lanka, Sinhala
 .xn--gecrj9c		whois.inregistry.net	# India, Gujarati AW
+.xn--h2breg3eve		whois.inregistry.net	# India
+.xn--h2brj9c8c		whois.inregistry.net	# India
 .xn--h2brj9c		whois.inregistry.net	# India, Hindi AW
 .xn--j1amh		whois.dotukr.com	# Ukraine
 .xn--j6w193g		whois.hkirc.hk		# Hong Kong
@@ -371,24 +376,27 @@
 .xn--kpry57d		whois.twnic.net.tw	# Taiwan, Traditional Chinese
 .xn--l1acc		NONE			# Mongolia
 .xn--lgbbat1ad8j	whois.nic.dz		# Algeria
-.xn--mix891f		WEB http://www.monic.mo/ # Macao
 .xn--mgb9awbf		whois.registry.om	# Oman
 .xn--mgba3a4f16a	whois.nic.ir		# Iran
 .xn--mgbaam7a8h		whois.aeda.net.ae	# United Arab Emirates
 .xn--mgbai9azgqp6j	NONE			# Pakistan
 .xn--mgbayh7gpa		WEB http://idn.jo/whois_a.aspx	# Jordan
 .xn--mgbbh1a71e		whois.inregistry.net	# India, Urdu AW
+.xn--mgbbh1a		whois.inregistry.net	# India
 .xn--mgbc0a9azcg	NONE			# Morocco
 .xn--mgberp4a5d4ar	whois.nic.net.sa	# Saudi Arabia
+.xn--mgbgu82a		whois.inregistry.net	# India
 .xn--mgbpl2fh		NONE			# Sudan
 .xn--mgbtx2b		whois.cmc.iq		# Iraq
 .xn--mgbx4cd0ab		whois.mynic.my		# Malaysia AW
+.xn--mix891f		WEB http://www.monic.mo/ # Macao
 .xn--node		whois.itdc.ge		# Georgia
 .xn--o3cw4h		whois.thnic.co.th	# Thailand
 .xn--ogbpf8fl		whois.tld.sy		# Syria
 .xn--p1ai		whois.tcinet.ru		# Russian Federation
 .xn--pgbs0dh		NONE			# Tunisia
 .xn--qxam		WEB https://grweb.ics.forth.gr/public/whois.jsp?lang=en # Greece AW
+.xn--rvc1e0am3e		whois.inregistry.net	# India
 .xn--s9brj9c		whois.inregistry.net	# India, Punjabi AW
 .xn--wgbh1c		whois.dotmasr.eg	# Egypt
 .xn--wgbl6a		whois.registry.qa	# Qatar
diff -Nru whois-5.2.15/version.h whois-5.2.17+deb9u1/version.h
--- whois-5.2.15/version.h	2017-02-27 00:37:41.000000000 +0100
+++ whois-5.2.17+deb9u1/version.h	2017-07-27 17:26:13.000000000 +0200
@@ -1 +1 @@
-#define VERSION "5.2.15"
+#define VERSION "5.2.17"
diff -Nru whois-5.2.15/whois.1 whois-5.2.17+deb9u1/whois.1
--- whois-5.2.15/whois.1	2013-12-26 07:48:10.000000000 +0100
+++ whois-5.2.17+deb9u1/whois.1	2017-07-27 17:44:55.000000000 +0200
@@ -209,7 +209,7 @@
 .SH "BUGS"
 The program may have buffer overflows in the command line parser:
 be sure to not pass untrusted data to it.
-It should be rewritten to use a dynamics strings library.
+It should be rewritten to use a dynamic strings library.
 .SH "HISTORY"
 This program closely tracks the user interface of the whois client
 developed at RIPE by Ambrose Magee and others on the base of the
diff -Nru whois-5.2.15/whois.c whois-5.2.17+deb9u1/whois.c
--- whois-5.2.15/whois.c	2017-02-27 00:37:41.000000000 +0100
+++ whois-5.2.17+deb9u1/whois.c	2017-07-27 17:44:55.000000000 +0200
@@ -834,8 +834,7 @@
 	   is queried */
 	if (state == 0 && strneq(buf, "   Domain Name:", 15))
 	    state = 1;
-	if (state == 1 && (strneq(buf, "   Whois Server:", 16)
-		    || strneq(buf, "   WHOIS Server:", 16))) {
+	if (state == 1 && strneq(buf, "   Registrar WHOIS Server:", 26)) {
 	    for (p = buf; *p != ':'; p++);	/* skip until the colon */
 	    for (p++; *p == ' '; p++);		/* skip the spaces */
 	    referral_server = strdup(p);
@@ -884,7 +883,7 @@
 	   This is not supposed to happen. */
 	if (state == 0 && strneq(buf, "Domain Name:", 12))
 	    state = 1;
-	if (state == 1 && strneq(buf, "Whois Server:", 13)) {
+	if (state == 1 && strneq(buf, "Registrar WHOIS Server:", 23)) {
 	    for (p = buf; *p != ':'; p++);	/* skip until colon */
 	    for (p++; *p == ' '; p++);		/* skip colon and spaces */
 	    referral_server = strdup(p);
@@ -1279,7 +1278,7 @@
     }
 
     new = malloc(sizeof("255.255.255.255"));
-    sprintf(new, "%ud.%ud.%ud.%ud", a >> 8, a & 0xff, b >> 8, b & 0xff);
+    sprintf(new, "%u.%u.%u.%u", a >> 8, a & 0xff, b >> 8, b & 0xff);
 #endif
 
     return new;
@@ -1309,7 +1308,7 @@
     a ^= 0xffff;
     b ^= 0xffff;
     new = malloc(sizeof("255.255.255.255"));
-    sprintf(new, "%ud.%ud.%ud.%ud", a >> 8, a & 0xff, b >> 8, b & 0xff);
+    sprintf(new, "%u.%u.%u.%u", a >> 8, a & 0xff, b >> 8, b & 0xff);
 #endif
 
     return new;

-- 
ciao,
Marco

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 9.2

Hi.

The updates referenced by each of these bugs was included in today's
point release of stretch.

Regards,

Adam

--- End Message ---

Reply to: