info-gnu
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

coreutils-6.5 released (stable)


From: Jim Meyering
Subject: coreutils-6.5 released (stable)
Date: Sun, 19 Nov 2006 18:10:13 +0100

If you haven't heard about the GNU coreutils, the FAQ is a good
place to start: <http://www.gnu.org/software/coreutils/faq/>.

This is a stable release.

There has been only one significant bug fix since the last release,
but it's an important one, affecting recursive traversals by chmod,
chgrp, chown and du.  See the NEWS below for details.  For older
changes see the distributed NEWS file, or this link:

  <http://git.sv.gnu.org/gitweb/?p=coreutils.git;a=blob;f=NEWS;hb=HEAD>

----------------------------------------------------------------
Here are the compressed sources:
  ftp://ftp.gnu.org/gnu/coreutils/coreutils-6.5.tar.gz   (7.7MB)
  ftp://ftp.gnu.org/gnu/coreutils/coreutils-6.5.tar.bz2   (5.2MB)

Here are the xdelta-style diffs:
  ftp://ftp.gnu.org/gnu/coreutils/coreutils-6.4-6.5.xdelta   (312KB)

Here are the GPG detached signatures[*]:
  ftp://ftp.gnu.org/gnu/coreutils/coreutils-6.5.tar.gz.sig
  ftp://ftp.gnu.org/gnu/coreutils/coreutils-6.5.tar.bz2.sig

Here are the MD5 and SHA1 checksums:

a0811d36a814d8102dbbcd82301274f4  coreutils-6.5.tar.gz
ecf8e9aa5b85dd89a0b18d5fab63de55  coreutils-6.5.tar.bz2
e715ce3d19f431c1426d635784d2f4c3  coreutils-6.4-6.5.xdelta
a199669c764c5a87857c73cc2c0f5f9bc7b72462  coreutils-6.5.tar.gz
0a2c27169ed0814466f0f5e4bd878a37c7508d28  coreutils-6.5.tar.bz2
f6e0129f40d664888982a3c9847f707a78b179ff  coreutils-6.4-6.5.xdelta

[*] You can use either of the above signature files to verify that
the corresponding file (without the .sig suffix) is intact.  First,
be sure to download both the .sig file and the corresponding tarball.
Then, run a command like this:

  gpg --verify coreutils-6.5.tar.gz.sig

If that command fails because you don't have the required public key,
then run this command to import it:

  gpg --keyserver wwwkeys.pgp.net --recv-keys D333CBA1

and rerun the `gpg --verify' command.

*****************
How can you help?
*****************
If you're interested in lending a hand, or just want to use
the latest versions right now, you can build these programs
and run the test suite like this:

   gzip -dc coreutils-6.5.tar.gz | tar xf -
   cd coreutils-6.5
   ./configure
   make
   make -k check >& log
   grep FAIL log

Be sure to use make's -k option so that make doesn't stop
just because one of the earlier tests fails.
Please report any build problems or test failures to the
address@hidden mailing list.
There are detailed instructions in the `Reporting bugs:' section
of the README file.

For further reading, see the coreutils home page
  http://www.gnu.org/software/coreutils/
and the FAQ list:
  http://www.gnu.org/software/coreutils/faq/


=======================================================================
NEWS
****

* Noteworthy changes in release 6.5 (2006-11-19) [stable]

** Bug fixes

  du (and the other fts clients: chmod, chgrp, chown) would exit early
  when encountering an inaccessible directory on a system with native
  openat support (i.e., linux-2.6.16 or newer along with glibc-2.4
  or newer).  This bug was introduced with the switch to gnulib's
  openat-based variant of fts, for coreutils-6.0.

  "ln --backup f f" now produces a sensible diagnostic

** New features

  rm accepts a new option: --one-file-system

Attachment: pgpWoGUyPTVjb.pgp
Description: PGP signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]