[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug-cpio] cpio-2.11 released [stable]
From: |
Sergey Poznyakoff |
Subject: |
[Bug-cpio] cpio-2.11 released [stable] |
Date: |
Wed, 10 Mar 2010 15:39:27 +0200 |
Hello,
I am pleased to announce the release of GNU cpio version 2.11.
This is mainly a bug-fix release. See below for a detailed list
of changes.
For a detailed information about GNU cpio, visit its home page:
http://www.gnu.org/software/cpio/
Here are the compressed sources:
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.gz (1.4MB)
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.bz2 (996KB)
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.shar.gz (2.1MB)
Here are the GPG detached signatures[*]:
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.gz.sig
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.bz2.sig
ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.shar.gz.sig
To reduce load on the main server, use a mirror listed at:
http://www.gnu.org/order/ftp.html
Here are the MD5 and SHA1 checksums:
1112bb6c45863468b5496ba128792f6c cpio-2.11.tar.gz
20fc912915c629e809f80b96b2e75d7d cpio-2.11.tar.bz2
10f2e57e2d6eb43f5c4e219982ab1ccf cpio-2.11.shar.gz
2c44a44195edf157060cb0b335a01ee0ece3169a cpio-2.11.tar.gz
6f1934b0079dc1e85ddff89cabdf01adb3a74abb cpio-2.11.tar.bz2
d2edd47a0d99b7be019d0dbbf00dadab3f1778e6 cpio-2.11.shar.gz
[*] You can use either of the above signature files to verify that
the corresponding file (without the .sig suffix) is intact. First,
be sure to download both the .sig file and the corresponding tarball.
Then, run a command like this:
gpg --verify cpio-2.11.tar.gz.sig
If that command fails because you don't have the required public key,
then run this command to import it:
gpg --keyserver keys.gnupg.net --recv-keys 55D0C732
and rerun the `gpg --verify' command.
This release was bootstrapped with the following tools:
Autoconf 2.63
Automake 1.11.1
Gnulib v0.0-3555-ge961f4c
Noteworthy changes in this release:
* Fix mt build.
* In copy-in mode, if directory attributes do not permit writing to it,
setting them is delayed until the end of run. This allows to extract files
to such directories.
* In copy-in mode, permissions of a directory are restored if the
directory appears in the file list after files in it (as in
output generated by `find . -depth'). This fixes debian bug #458079.
* Fix possible memory overflow in the rmt client code (CVE-2010-0624).
Regards,
Sergey
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Bug-cpio] cpio-2.11 released [stable],
Sergey Poznyakoff <=