We are pleased to announce version 2.3 of The GNU Networking Utilities. GNU Networking Utilities contain traditional networking utilities, clients and servers, including ftp, telnet, inetd, rsh/rlogin, tftp, talk, syslogd, ping, traceroute, whois, hostname, dnsdomainname, ifconfig, and logger.
Happy hacking, Simon Here are the compressed sources: https://ftpmirror.gnu.org/inetutils/inetutils-2.3.tar.gz (2.6MB) https://ftpmirror.gnu.org/inetutils/inetutils-2.3.tar.xz (1.5MB) Here are the GPG detached signatures[*]: https://ftpmirror.gnu.org/inetutils/inetutils-2.3.tar.gz.sig https://ftpmirror.gnu.org/inetutils/inetutils-2.3.tar.xz.sig Use a mirror for higher download bandwidth: https://www.gnu.org/order/ftp.html Here are the SHA1 and SHA256 checksums: cd728a91f03c5bd3c7a8d210904bb55e315ca0cd inetutils-2.3.tar.gz HO2Jn+B8YNaFQdsWhq+ENUAk+lA+FsQ67C7z4DuNRLY inetutils-2.3.tar.gz 539832b06727d03913f75c12c901d9b22db96cf0 inetutils-2.3.tar.xz CwG7COKWI8TjuUDyM8lhRR2a+MUGYwGt12pSqV1Rdyw inetutils-2.3.tar.xz The SHA256 checksum is base64 encoded, instead of the hexadecimal encoding that most checksum tools default to. [*] Use a .sig file to verify that the corresponding file (without the .sig suffix) is intact. First, be sure to download both the .sig file and the corresponding tarball. Then, run a command like this: gpg --verify inetutils-2.3.tar.gz.sig If that command fails because you don't have the required public key, or that public key has expired, try the following commands to update or refresh it, and then rerun the 'gpg --verify' command. gpg --locate-external-key si...@josefsson.org gpg --recv-keys 51722B08FE4745A2 wget -q -O- 'https://savannah.gnu.org/project/release-gpgkeys.php?group=inetutils&download=1' | gpg --import - This release was bootstrapped with the following tools: Gnulib f310223230 Autoconf 2.71 Automake 1.16.5 Bison 3.7.5 M4 1.4.18 Makeinfo 6.7 Help2man 1.48.1 Make 4.3 Gzip 1.10 Tar 1.34 NEWS * Noteworthy changes in release 2.3 (2022-07-08) [stable] ** telnet *** Don't infloop when (malicious) server sends too large terminal value, see: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945861 *** Abort subnegotiation of X Display Location Option with WONT when DISPLAY value is too large for buffer. Reported by Joerg Mayer in <https://lists.gnu.org/archive/html/bug-inetutils/2022-01/msg00010.html>. *** Fix off-by-one error in Terminal-Type option subnegotiation if the TERM variable has exactly 44 bytes. This concerns the CVE-2019-0053 fixes. Reported by Erik Auerswald in <https://lists.gnu.org/archive/html/bug-inetutils/2022-02/msg00004.html>. *** Avoid crashing when given unexpected or invalid commands from tty. Reported by Peter Kasza in <https://lists.gnu.org/archive/html/bug-inetutils/2017-06/msg00000.html>, AiDai in <https://savannah.gnu.org/bugs/?61725> and <https://savannah.gnu.org/bugs/?61726>, and ZFeiXQ in <https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00017.html>. ** Various bugs fixes, internal improvements and clean ups. Further cleanup of configure.ac, updates to modern autoconf releases, and improved gnulib usage.
signature.asc
Description: PGP signature