bug-cpio
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug-cpio] cpio-2.11 released [stable]


From: Sergey Poznyakoff
Subject: [Bug-cpio] cpio-2.11 released [stable]
Date: Wed, 10 Mar 2010 15:39:27 +0200

Hello,

I am pleased to announce the release of GNU cpio version 2.11.
This is mainly a bug-fix release. See below for a detailed list
of changes.

For a detailed information about GNU cpio, visit its home page:
    http://www.gnu.org/software/cpio/

Here are the compressed sources:
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.gz    (1.4MB)
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.bz2   (996KB)
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.shar.gz   (2.1MB)

Here are the GPG detached signatures[*]:
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.gz.sig
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.tar.bz2.sig
  ftp://ftp.gnu.org/gnu/cpio//cpio-2.11.shar.gz.sig

To reduce load on the main server, use a mirror listed at:
  http://www.gnu.org/order/ftp.html

Here are the MD5 and SHA1 checksums:

1112bb6c45863468b5496ba128792f6c          cpio-2.11.tar.gz
20fc912915c629e809f80b96b2e75d7d          cpio-2.11.tar.bz2
10f2e57e2d6eb43f5c4e219982ab1ccf          cpio-2.11.shar.gz
2c44a44195edf157060cb0b335a01ee0ece3169a  cpio-2.11.tar.gz
6f1934b0079dc1e85ddff89cabdf01adb3a74abb  cpio-2.11.tar.bz2
d2edd47a0d99b7be019d0dbbf00dadab3f1778e6  cpio-2.11.shar.gz

[*] You can use either of the above signature files to verify that
the corresponding file (without the .sig suffix) is intact.  First,
be sure to download both the .sig file and the corresponding tarball.
Then, run a command like this:

  gpg --verify cpio-2.11.tar.gz.sig

If that command fails because you don't have the required public key,
then run this command to import it:

  gpg --keyserver keys.gnupg.net --recv-keys 55D0C732

and rerun the `gpg --verify' command.

This release was bootstrapped with the following tools:
  Autoconf 2.63
  Automake 1.11.1
  Gnulib v0.0-3555-ge961f4c

Noteworthy changes in this release:  

* Fix mt build.
* In copy-in mode, if directory attributes do not permit writing to it,
setting them is delayed until the end of run. This allows to extract files
to such directories.
* In copy-in mode, permissions of a directory are restored if the
directory appears in the file list after files in it (as in
output generated by `find . -depth'). This fixes debian bug #458079.
* Fix possible memory overflow in the rmt client code (CVE-2010-0624).

Regards,
Sergey




reply via email to

[Prev in Thread] Current Thread [Next in Thread]