From unknown Sun Jun 15 01:08:15 2025 X-Loop: help-debbugs@gnu.org Subject: bug#65394: gzip-1.13 released [stable] Resent-From: Jim Meyering Original-Sender: "Debbugs-submit" Resent-CC: bug-gzip@gnu.org Resent-Date: Sun, 20 Aug 2023 00:40:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 65394 X-GNU-PR-Package: gzip X-GNU-PR-Keywords: To: info-gnu@gnu.org Cc: 65394@debbugs.gnu.org X-Debbugs-Original-Cc: bug-gzip@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.169249198330538 (code B ref -1); Sun, 20 Aug 2023 00:40:02 +0000 Received: (at submit) by debbugs.gnu.org; 20 Aug 2023 00:39:43 +0000 Received: from localhost ([127.0.0.1]:52495 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qXWTn-0007wU-AL for submit@debbugs.gnu.org; Sat, 19 Aug 2023 20:39:43 -0400 Received: from lists.gnu.org ([2001:470:142::17]:35210) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qXWTj-0007wB-9n for submit@debbugs.gnu.org; Sat, 19 Aug 2023 20:39:41 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qXWTc-0004BU-Bk; Sat, 19 Aug 2023 20:39:32 -0400 Received: from mail-oi1-x236.google.com ([2607:f8b0:4864:20::236]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1qXWTZ-0001vd-Lm; Sat, 19 Aug 2023 20:39:32 -0400 Received: by mail-oi1-x236.google.com with SMTP id 5614622812f47-3a800814122so1681174b6e.0; Sat, 19 Aug 2023 17:39:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1692491967; x=1693096767; h=mime-version:message-id:date:mail-followup-to:subject:cc:to:from :sender:from:to:cc:subject:date:message-id:reply-to; bh=xamzDGv3UCW6zboboKjJAM37T2lZ97HVx5JXTAkj3r8=; b=iMekdead10YWW1Y2Bn6B/6Ji+4vXxIwTjgxEUqaty4FeB5M9S50L2sRQeHUriiPHW+ 248prlmE4r8cPaQrZb3ZWE22oX38BTlESTDjZxh+7hOk0sI4bbnEpS0nPBqyjJqGsp4y UroudHRDcCvpl+ffgttPQ6k+B5X8uB4SGO0Uke5PKiiZ0Rj/ZeAvBEHJAOt+y5tDBsOG aAfGn+4CQn2oBVLjbOoWG8p0thDzsZi6Win+Q4guYT4fx7h5aB6pVZKScVBxmfW/T7ke qN+8RoHw06Qudpg3z17VB4gazdwbQGiSh7JVVjaPoZpqBxLtBUNXJLHijv+4faQ6yDlj jBuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692491967; x=1693096767; h=mime-version:message-id:date:mail-followup-to:subject:cc:to:from :sender:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=xamzDGv3UCW6zboboKjJAM37T2lZ97HVx5JXTAkj3r8=; b=acFoCyaLMouwoRQe+8hmRC/Lp71ifAb2oDrRYbxcIEgwy7WAO8cMMLR5UnG2VDgway yrDxIYgziO2jgwi46ulgi9Nnndu6+jpMlh+mElpCtiiHcnKzgP/yq6r8/vdNj5lLP2Be YfOedvkvMUI+JVmpQ3Rm9NcgvpWg6aeYqKRAaTCxQma0RRXoEdC/rZ6xqhF7ehvwL1LN sEVqmTTyKhp7URMyX7Pl1utDD8fOdrF4JVIOXUp4TU7e/aud2qX7S/FjdGOD74L1KHyC LjY7RhqQrObza2mbAKuxT5WC6KFyLcyO9JdDOulfRYgjXr7O0UdMT8xC+LqQ9sVfizVj C1Ag== X-Gm-Message-State: AOJu0YzPLM/eZG3rFVSHgrHUEQGNtGkWxjbt/+1Y0m9McOl4lFcqq1Ob uHbUgGcLprx7RBBZShGLlI6saaW5YUg= X-Google-Smtp-Source: AGHT+IGdbInHGqfN9iO6o/RDJ7Y4y3oTnIAFNnV1ZM5KZ4J60kybPAebShfF7WZ9DXi+5BGLHZbI3w== X-Received: by 2002:a05:6808:2982:b0:3a7:2120:8bb with SMTP id ex2-20020a056808298200b003a7212008bbmr3810354oib.17.1692491966510; Sat, 19 Aug 2023 17:39:26 -0700 (PDT) Received: from meyering-mbp ([2620:10d:c090:400::5:15a7]) by smtp.gmail.com with ESMTPSA id x23-20020a62fb17000000b0064928cb5f03sm3679349pfm.69.2023.08.19.17.39.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 19 Aug 2023 17:39:25 -0700 (PDT) From: Jim Meyering Mail-Followup-To: bug-gzip@gnu.org Date: Sat, 19 Aug 2023 17:39:23 -0700 Message-ID: MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" Received-SPF: pass client-ip=2607:f8b0:4864:20::236; envelope-from=meyering@gmail.com; helo=mail-oi1-x236.google.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-Spam-Score: 1.5 (+) X-Spam-Report: Spam detection software, running on the system "debbugs.gnu.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: This is to announce gzip-1.13, a stable release. Thanks to Paul and Bruno for contributing. There have been 50 commits by 3 people in the 71 weeks since 1.12. See the NEWS below for a brief summary. Content analysis details: (1.5 points, 10.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (meyering[at]gmail.com) 1.0 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.2 FREEMAIL_FORGED_FROMDOMAIN 2nd level domains in From and EnvelopeFrom freemail headers are different X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: 0.5 (/) --=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable This is to announce gzip-1.13, a stable release. Thanks to Paul and Bruno for contributing. There have been 50 commits by 3 people in the 71 weeks since 1.12. See the NEWS below for a brief summary. Thanks to everyone who has contributed! The following people contributed changes to this release: Bruno Haible (4) Jim Meyering (15) Paul Eggert (31) Jim [on behalf of the gzip maintainers] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Here is the GNU gzip home page: http://gnu.org/s/gzip/ For a summary of changes and contributors, see: http://git.sv.gnu.org/gitweb/?p=3Dgzip.git;a=3Dshortlog;h=3Dv1.13 or run this command from a git-cloned gzip directory: git shortlog v1.12..v1.13 Here are the compressed sources: https://ftp.gnu.org/gnu/gzip/gzip-1.13.tar.gz (1.3MB) https://ftp.gnu.org/gnu/gzip/gzip-1.13.tar.xz (820KB) Here are the GPG detached signatures: https://ftp.gnu.org/gnu/gzip/gzip-1.13.tar.gz.sig https://ftp.gnu.org/gnu/gzip/gzip-1.13.tar.xz.sig Use a mirror for higher download bandwidth: https://www.gnu.org/order/ftp.html Here are the SHA1 and SHA256 checksums: 9cc4f2220c8028823433e9d869dc07610aefefb5 gzip-1.13.tar.gz IPyBiu666Hzb8gnTUUGtnTzzErNaXmvmG/z7+e3dISo=3D gzip-1.13.tar.gz a793e107a54769576adc16703f97c39ee7afdd4e gzip-1.13.tar.xz dFTraTXbF8ZlVXbC4bD6vv04tNCTbg+H9IzQYs6RoFc=3D gzip-1.13.tar.xz Verify the base64 SHA256 checksum with cksum -a sha256 --check from GNU coreutils-9.2 or OpenBSD's cksum since 2007. Use a .sig file to verify that the corresponding file (without the .sig suffix) is intact. First, be sure to download both the .sig file and the corresponding tarball. Then, run a command like this: gpg --verify gzip-1.13.tar.gz.sig The signature should match the fingerprint of the following key: pub rsa4096/0x7FD9FCCB000BEEEE 2010-06-14 [SCEA] Key fingerprint =3D 155D 3FC5 00C8 3448 6D1E EA67 7FD9 FCCB 000B E= EEE uid [ unknown] Jim Meyering uid [ unknown] Jim Meyering uid [ unknown] Jim Meyering If that command fails because you don't have the required public key, or that public key has expired, try the following commands to retrieve or refresh it, and then rerun the 'gpg --verify' command. gpg --locate-external-key jim@meyering.net gpg --recv-keys 7FD9FCCB000BEEEE wget -q -O- 'https://savannah.gnu.org/project/release-gpgkeys.php?group= =3Dgzip&download=3D1' | gpg --import - As a last resort to find the key, you can try the official GNU keyring: wget -q https://ftp.gnu.org/gnu/gnu-keyring.gpg gpg --keyring gnu-keyring.gpg --verify gzip-1.13.tar.gz.sig This release was bootstrapped with the following tools: Autoconf 2.72c.32-cb6fb Automake 1.16i Gnulib v0.1-6631-g5651802c60 NEWS * Noteworthy changes in release 1.13 (2023-08-19) [stable] ** Changes in behavior zless now diagnoses gzip failures, if using less 623 or later. When SIGPIPE is ignored, gzip now exits with status 2 (warning) instead of status 1 (error) when writing to a broken pipe. This is more useful with programs like 'less' that treat gzip exit status 2 as a non-failure. ** Bug fixes 'gzip -d' no longer fails to report invalid compressed data that uses a dictionary distance outside the input window. [bug present since the beginning] Port to C23, which does not allow K&R-style function definitions with parameters, and which does not define __alignas_is_defined. also announced here: https://savannah.gnu.org/news/?id=3D10501 --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEEFV0/xQDINEhtHupnf9n8ywAL7u4FAmThYLsRHGppbUBtZXll cmluZy5uZXQACgkQf9n8ywAL7u7N1xAAkvw5DiwmN7WsdoIRjfJEdlWl8ClDgLRl YVRds8JPte8d3YEBnU3VPSoRwCv/qDWlTAXlMuyvtLv3nf9I586J11jH6W2Uot9E Jn9Ky5CVdRmhlNBhKrazlc96Z8EUllOrp2PL5dRwkRUS1ngcrTCEMydX0tTPOZ0D 5FfBUuWfXwVKYAEPgX+X5JZGDXbG2jfBwubivOK8LwduC0yb7GH0uvs8lKb8Zew1 8xS2ZHUUE5HMkbB54D+vCQO1D9cwEFwmDv3lnNCtd3jHJgta62JbtnMZXmSNTx2R 3ZrMrjUOBGMNcwp0QHzFcTACO2gKvI/tKTb42mFxNf90ifWR4VrXzLn1Yho5E8Cp Pg8tzv3Auz5JfWH1bfWILjTrfZi1BnarLfE377bQ2zARGV1vGgPt92KYSazHzIZb P8ZyWcqyOpzOUIXK7jeYBBTpEiMQBQQFr2DnM+t9ZnZWRazoLOVV/9Ju7EPidgTY t7kG6kUkCAWWiz+jswbYvWUSatWd55Iy9l0MwrkNXMTlCou8wVNy+A3INVJbKC0H 7HYAf+AOyfzEKy/5jtzbh/5u2O9b2ORT5E9waQD4q8l3pEa5GZ6ILZApl11JL+jo IlWrrvc5odkjIPRSQ0I1mDUgA8FOFEJS8nsy1mwLPq9Eki4TGSmIAY+80B/XaAso jI4QPc+2WRQ= =/1jW -----END PGP SIGNATURE----- --=-=-=--