[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

cppi-1.18 released [stable]

From: Jim Meyering
Subject: cppi-1.18 released [stable]
Date: Sat, 16 Mar 2013 20:48:43 +0100

This is to announce cppi-1.18, a stable release.
cppi indents C preprocessor directives to reflect their nesting.

This release is mainly to fix the slightly risky[*] files
From the previous release.

There have been 12 commits by 3 people in the 32 weeks since 1.17.

See the NEWS below for a brief summary.

Thanks to everyone who has contributed!
The following people contributed changes to this release:

  Akim Demaille (1)
  Eric Blake (2)
  Jim Meyering (9)

Jim [on behalf of the cppi maintainers]

Here is the GNU cppi home page:

For a summary of changes and contributors, see:;a=shortlog;h=v1.18
or run this command from a git-cloned cppi directory:
  git shortlog v1.17..v1.18

To summarize the 328 gnulib-related changes, run these commands
From a git-cloned cppi directory:
  git checkout v1.18
  git submodule summary v1.17

Here are the compressed sources and a GPG detached signature[*]:

Use a mirror for higher download bandwidth:

[*] Use a .sig file to verify that the corresponding file (without the
.sig suffix) is intact.  First, be sure to download both the .sig file
and the corresponding tarball.  Then, run a command like this:

  gpg --verify cppi-1.18.tar.xz.sig

If that command fails because you don't have the required public key,
then run this command to import it:

  gpg --keyserver --recv-keys 7FD9FCCB000BEEEE

and rerun the 'gpg --verify' command.

This release was bootstrapped with the following tools:
  Autoconf 2.69.77-845e7
  Automake 1.13a
  Flex 2.5.36
  Gnulib v0.0-7896-gcbd4daf
  Gperf 3.0.4
  Help2man 1.40.12


* Noteworthy changes in release 1.18 (2013-03-16) [stable]

** Build- and infrastructure-related

  Gnulib infrastructure updates.

  Regenerate files using a version of automake that
  is not susceptible to CVE-2009-4029 or CVE-2012-3386.

[*] For details on why the files in 1.17 pose a risk, see these:

Attachment: pgphv60rl6as6.pgp
Description: PGP signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]