libnet-netmask-perl (2.0002-2) unstable; urgency=medium [ Debian Janitor ] * Apply multi-arch hints. + libnet-netmask-perl: Add Multi-Arch: foreign. -- Jelmer Vernooij <jelmer@debian.org> Thu, 13 Oct 2022 22:26:40 +0100 libnet-netmask-perl (2.0002-1) unstable; urgency=medium * Team upload * Import upstream version 2.0002. * Declare compliance with Debian Policy 4.6.1 * Update lintian overrides -- Florian Schlichting <fsfs@debian.org> Wed, 21 Sep 2022 23:05:40 +0200 libnet-netmask-perl (2.0001-1) unstable; urgency=medium [ upstream ] * new release(s) [ Debian Janitor ] * Drop no longer supported add-log-mailing-address setting from debian/changelog. * build-depend on debhelper-compat (not debhelper) * set upstream metadata fields: Bug-Submit * Remove obsolete fields Contact, Name from debian/upstream/metadata (already present in machine-readable debian/copyright). * Remove constraints unnecessary since stretch: + Build-Depends-Indep: Drop versioned constraint on libtest-useallmodules-perl. [ gregor herrmann ] * Drop 0001-SECURITY-Prevent-ambiguous-networks-from-being-accid.patch which was taken from the upstream git repo. * Update years of upstream copyright. * Set Rules-Requires-Root: no. * Annotate test-only build dependencies with <!nocheck>. * Bump debhelper-compat to 13. * Modernize debian/watch. [ Jonas Smedegaard ] * update git-buildpackage config: avoid any .git* files * update copyright info: + add source script copyright-check + update coverage + use Reference field (not License-Reference); tighten lintian overrides + list GitHub issue tracker as preferred upstream contact + fix Upstream-Name * use semantic newlines in long description and copyright fields * stop build-depend explicitly on perl: not called directly during build * relax to build-depend unversioned on libtest2-suite-perl: required version satisfied in all supported Debian releases * declare compliance with Debian Policy 4.6.0 -- Jonas Smedegaard <dr@jones.dk> Sun, 12 Sep 2021 13:41:02 +0200 libnet-netmask-perl (1.9104-2) unstable; urgency=medium * Team upload. * Add patch 0001-SECURITY-Prevent-ambiguous-networks-from-being- accid.patch. This patch, taken from upstream commit 9023b40, fixes a security issue with IP addresses containing leading zeros which are interpreted as octal numbers. This is CVE-2021-29424, for details cf. also https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/. From upstram Changes for 2.0000: - SECURITY: IPv4 addresses with leading zeros are no longer allowed. They will return a parse error like any invalid IP address. - SECURITY: 10.0.0, 10.0, and 10 address portions now by default return a parse error. This can be overridden … Cf. /usr/share/doc/libnet-netmask-perl/changelog.gz for details. Closes: #986135 -- gregor herrmann <gregoa@debian.org> Sun, 11 Apr 2021 02:08:34 +0200 # Older entries have been removed from this changelog. # To read the complete changelog use `apt changelog libnet-netmask-perl`.
Generated by dwww version 1.15 on Wed May 22 22:36:41 CEST 2024.