Back to dpkg PTS page

Accepted dpkg 1.17.8 (source amd64 all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 28 Apr 2014 13:33:11 +0200
Source: dpkg
Binary: libdpkg-dev dpkg dpkg-dev libdpkg-perl dselect
Architecture: source amd64 all
Version: 1.17.8
Distribution: unstable
Urgency: high
Maintainer: Dpkg Developers <debian-dpkg@lists.debian.org>
Changed-By: Guillem Jover <guillem@debian.org>
Description: 
 dpkg       - Debian package management system
 dpkg-dev   - Debian package development tools
 dselect    - Debian package management front-end
 libdpkg-dev - Debian package management static library
 libdpkg-perl - Dpkg perl modules
Closes: 733057 739634 745592 745651 745869
Changes: 
 dpkg (1.17.8) unstable; urgency=high
 .
   [ Guillem Jover ]
   * Do not backup nonexistent database files from the cron.daily file.
     And stop emitting tar warnings. Closes: #745592, #745651
   * Test suite:
     - Improve Perl code coverage.
     - Improve C code coverage.
   * Handle space-only strings when parsing versions in libdpkg.
   * Document the environment requirements for the dpkg-maintscript-helper
     supports command in the man page. Closes: #739634
   * Improve wording for «dpkg --verify» and --verify-format in the man page.
     Closes: #733057
   * Switch test runner from Test::Harness to TAP::Harness.
   * Use the perl TAP::Harness for the C test suite instead of the automake
     tap-driver, to avoid requiring automake >= 1.12, currently not present
     in stable.
   * Enable failed test case reporting from the TAP::Harness, so that we get
     more meaningful reports on failure from the C test suite.
   * Correctly parse C-style diff filenames in Dpkg::Source::Patch, to avoid
     directory traversal attempts from hostile source packages when unpacking
     them. Reported by Jakub Wilk <jwilk@debian.org>. Fixes CVE-2014-0471.
 .
   [ Updated programs translations ]
   * German (Sven Joachim).
   * Russian (Yuri Kozlov). Closes: #745869
   * Vietnamese (Trần Ngọc Quân).
Checksums-Sha1: 
 56cfed93e468ffc224b50c710ae4bb69070f48aa 2051 dpkg_1.17.8.dsc
 848eb9bfff37a2a583077e215e743396b28865c0 4044064 dpkg_1.17.8.tar.xz
 9a060023a4d92e13cc0a7e51a98bd84b3cba67ed 776808 libdpkg-dev_1.17.8_amd64.deb
 16d488866853db120fe92ed24750d93794e96fcf 2671508 dpkg_1.17.8_amd64.deb
 85e59ef895bc8c0b92e0c5ea0942b71171e9f9eb 1039240 dselect_1.17.8_amd64.deb
 355310d2cf5939ac257b49bcf33a5b0e24527a4f 1418230 dpkg-dev_1.17.8_all.deb
 a0e5ce0be6cc902adb8a88ee5da2519731f56524 950916 libdpkg-perl_1.17.8_all.deb
Checksums-Sha256: 
 de33d01e7e3316022bdac4837a5455feda5a3f31fc71c376adff3e53701b6fb9 2051 dpkg_1.17.8.dsc
 d69ea0fa3209ce41f7d05b3414d6f7241d8cb66a73c7e15250dce7b2cbb07ede 4044064 dpkg_1.17.8.tar.xz
 8ae5f03149cfca76b4cbbe81d6f4607b42974eff4427dd5b33784b441fe05e4b 776808 libdpkg-dev_1.17.8_amd64.deb
 b7f7d066fe71431af863e54ef41ad7f7cb70f3d40cee74d044be5e1a242a4390 2671508 dpkg_1.17.8_amd64.deb
 5c2c9aae7cfe2589d7ab0cc946ce5c8a88efb862a1fb9cf7e8341a668b13f848 1039240 dselect_1.17.8_amd64.deb
 d62a69f46a7f877ead2680f9e60fdfc7c80e080b54f6f45102d6a5684b3bb435 1418230 dpkg-dev_1.17.8_all.deb
 4110533fe1aaa0824005c26c9b19245b6bf049bf1912b2ee8e4dfa33c16fed62 950916 libdpkg-perl_1.17.8_all.deb
Files: 
 94cfe2daa5c034c8ab25bb8daaa5e1e6 776808 libdevel optional libdpkg-dev_1.17.8_amd64.deb
 c760c41ce92ba437078edf9c711c4020 2671508 admin required dpkg_1.17.8_amd64.deb
 69d30a6acb67f77293a2e3b878490935 1039240 admin optional dselect_1.17.8_amd64.deb
 099edbcc224539fd5c51f5e852bd5296 1418230 utils optional dpkg-dev_1.17.8_all.deb
 5d6026ba646288a4610e57d9bcbdc459 950916 perl optional libdpkg-perl_1.17.8_all.deb
 cab2c5924d6dc23f061c47bd6db3e694 2051 admin required dpkg_1.17.8.dsc
 d24b7c8add91c5e6c0d419140848529d 4044064 admin required dpkg_1.17.8.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=xl6P
-----END PGP SIGNATURE-----