|
|
|
|
Changelog for libGraphicsMagick++-Q16-12-1.3.25-129.1.x86_64.rpm :
Wed Mar 13 13:00:00 2019 pgajdosAATTsuse.com - security update - added patches CVE-2019-7175 [bsc#1128649] + GraphicsMagick-CVE-2019-7175.patch Mon Feb 11 13:00:00 2019 Petr Gajdos - security update (pdf.c): * CVE-2019-7397 [bsc#1124366] + GraphicsMagick-CVE-2019-7397.patch
Thu Jan 3 13:00:00 2019 Petr Gajdos - security update (bmp.c): * CVE-2018-20467 [bsc#1120381] + GraphicsMagick-bmp.c-update.patch
Fri Dec 21 13:00:00 2018 Petr Gajdos - security update (tga.c): * CVE-2018-20184 [bsc#1119822] + GraphicsMagick-CVE-2018-20184.patch
Fri Dec 21 13:00:00 2018 Petr Gajdos - security update (dib.c): * CVE-2018-20189 [bsc#1119790] + GraphicsMagick-CVE-2018-20189.patch
Thu Nov 1 13:00:00 2018 Petr Gajdos - security update (msl.c): * CVE-2018-18544 [bsc#1113064] + GraphicsMagick-CVE-2018-18544.patch
Tue Oct 23 14:00:00 2018 Petr Gajdos - security update (tiff.c): * CVE-2017-10794 [bsc#1112392] GraphicsMagick-CVE-2017-10794.patch
Mon Oct 22 14:00:00 2018 Petr Gajdos - security update (pict.c): * CVE-2017-14997 [bsc#1112399] + GraphicsMagick-CVE-2017-14997.patch
Mon Oct 22 14:00:00 2018 Petr Gajdos - asan_build: build ASAN included - debug_build: build more suitable for debugging
Fri Oct 12 14:00:00 2018 Petr Gajdos - security update (bmp.c) * CVE-2018-18024 [bsc#1111069] * GraphicsMagick-CVE-2018-18024.patch
Sat Sep 15 14:00:00 2018 Petr Gajdos - security update (meta.c): * CVE-2018-16750 [bsc#1108283] + GraphicsMagick-meta.c-update.patch
Mon Sep 10 14:00:00 2018 Petr Gajdos - security update (pict.c): * CVE-2018-16644 [bsc#1107609] + GraphicsMagick-CVE-2018-16644.patch
Mon Sep 10 14:00:00 2018 Petr Gajdos - security update (bmp.c, dib.c): * CVE-2018-16645 [bsc#1107604] + GraphicsMagick-CVE-2018-16645.patch
Mon Sep 3 14:00:00 2018 pgajdosAATTsuse.com - security update * CVE-2018-16323 [bsc#1106855] . GraphicsMagick-CVE-2017-13776,13777.patch renamed to GraphicsMagick-CVE-2017-13776,13777,CVE-2018-16323.patch
Wed Aug 22 14:00:00 2018 pgajdosAATTsuse.com - disable PS, PS2, PS3 and PDF coders by default, remove gs calls from delegates.mgk [bsc#1105592]
Tue Aug 7 14:00:00 2018 pgajdosAATTsuse.com - security update (pcd.c): * CVE-2018-14435 [bsc#1102007] + GraphicsMagick-CVE-2018-14435.patch
Wed Jun 20 14:00:00 2018 pgajdosAATTsuse.com - security update (rgb.c, cmyk.c, gray.c) * CVE-2018-10805 and similar memory leaks [bsc#1095812] + GraphicsMagick-CVE-2018-10805.patch
Wed Jun 13 14:00:00 2018 pgajdosAATTsuse.com - security udpate (dcm.c) * fix invalid reads in dcm.c [bsc#1075821c#14] GraphicsMagick-dcm.c-update-2.patch
Wed May 23 14:00:00 2018 pgajdosAATTsuse.com - security update (miff.c) * CVE-2017-18271 [bsc#1094204] + GraphicsMagick-CVE-2017-18271.patch
Mon Apr 30 14:00:00 2018 pgajdosAATTsuse.com - security update (png.c) * CVE-2018-10177 [bsc#1089781] + GraphicsMagick-CVE-2018-10177.patch
Tue Apr 24 14:00:00 2018 pgajdosAATTsuse.com - security update (core) * CVE-2018-6799 [bsc#1080522] + GraphicsMagick-CVE-2018-6799.patch
Tue Apr 24 14:00:00 2018 pgajdosAATTsuse.com - GraphicsMagick-CVE-2017-8353.patch renamed to GraphicsMagick-CVE-2017-13066.patch [bsc#1055010] - GraphicsMagick-CVE-2017-11532.patch renamed to GraphicsMagick-CVE-2017-11641.patch [bsc#1050623] - GraphicsMagick-CVE-2017-18028.patch renamed to GraphicsMagick-CVE-2017-18229.patch [bsc#1085236]
Fri Apr 13 14:00:00 2018 pgajdosAATTsuse.com - security update (png.c) * CVE-2018-9018 [bsc#1086773] + GraphicsMagick-CVE-2018-9018.patch
Tue Apr 10 14:00:00 2018 pgajdosAATTsuse.com - security update (gif.c) * CVE-2017-18254 [bsc#1087027] + GraphicsMagick-CVE-2017-18254.patch
Fri Apr 6 14:00:00 2018 pgajdosAATTsuse.com - security update (pcd.c) * CVE-2017-18251 [bsc#1087037] + ImageMagick-CVE-2017-18251.patch
Tue Mar 20 13:00:00 2018 pgajdosAATTsuse.com - security update (core) * CVE-2017-11524 [bsc#1050087] + GraphicsMagick-CVE-2017-11524.patch
Wed Mar 14 13:00:00 2018 pgajdosAATTsuse.com - security update (cineon.c): * CVE-2017-18230 [bsc#1085233] + GraphicsMagick-CVE-2017-18230.patch
Wed Feb 28 13:00:00 2018 pgajdosAATTsuse.com - security update (core) * CVE-2017-16353 [bsc#1066170] + GraphicsMagick-CVE-2017-16353.patch * CVE-2017-16352 [bsc#1066168] + GraphicsMagick-CVE-2017-16352.patch * CVE-2017-14314 [bsc#1058630] + GraphicsMagick-CVE-2017-14314.patch * CVE-2017-14505 [bsc#1059735] + GraphicsMagick-CVE-2017-14505.patch
Mon Feb 26 13:00:00 2018 pgajdosAATTsuse.com - security update (emf.c): * CVE-2017-15016 [bsc#1082291] + GraphicsMagick-CVE-2017-15016.patch
Mon Feb 26 13:00:00 2018 pgajdosAATTsuse.com - security update (png.c): * CVE-2017-15017 [bsc#1082283] + GraphicsMagick-CVE-2017-15017.patch
Tue Feb 20 13:00:00 2018 pgajdosAATTsuse.com - security update (uil.c): * CVE-2017-11533 [bsc#1050132] + GraphicsMagick-CVE-2017-11533.patch
Tue Feb 20 13:00:00 2018 pgajdosAATTsuse.com - security update (wpg.c): * CVE-2017-17682 [bsc#1072898] + GraphicsMagick-CVE-2017-17682.patch
Tue Feb 20 13:00:00 2018 pgajdosAATTsuse.com - security update (rgb.c): * CVE-2017-17500 [bsc#1077737] + GraphicsMagick-rgb.c-update.patch
Thu Feb 15 13:00:00 2018 pgajdosAATTsuse.com - security update (pcl.c): * CVE-2017-11637 [bsc#1050669] + GraphicsMagick-CVE-2017-11637.patch
Wed Feb 14 13:00:00 2018 pgajdosAATTsuse.com - security update (map.c): * CVE-2017-11638, CVE-2017-11642 [bsc#1050617] + GraphicsMagick-CVE-2017-11638,11642.patch
Wed Feb 14 13:00:00 2018 pgajdosAATTsuse.com - security update (gray.c): * CVE-2017-17503 [bsc#1072934] + GraphicsMagick-gray.c-update.patch
Tue Feb 13 13:00:00 2018 pgajdosAATTsuse.com - security udpate (cut.c): * CVE-2017-14060 [bsc#1056768] + ImageMagick-CVE-2017-14060.patch
Fri Feb 9 13:00:00 2018 pgajdosAATTsuse.com - update dcm.c to newest code
Fri Feb 9 13:00:00 2018 pgajdosAATTsuse.com - security update (cmyk.c): * CVE-2017-17502 [bsc#1073081] + GraphicsMagick-cmyk.c-update.patch
Wed Feb 7 13:00:00 2018 pgajdosAATTsuse.com - security update (jpeg.c): * CVE-2017-11450 [bsc#1049374] + GraphicsMagick-CVE-2017-11450.patch * CVE-2017-11140 [bsc#1047900] + GraphicsMagick-CVE-2017-11140.patch
Tue Feb 6 13:00:00 2018 pgajdosAATTsuse.com - security update (pcx.c): * CVE-2017-14224 [bsc#1058009] + ImageMagick-CVE-2017-14224.patch
Mon Jan 29 13:00:00 2018 pgajdosAATTsuse.com - security update (tiff.c): * CVE-2017-17912 [bsc#1074307] + GraphicsMagick-CVE-2017-17912.patch * CVE-2017-18229 [bsc#1085236] + GraphicsMagick-CVE-2017-18229.patch
Fri Jan 26 13:00:00 2018 pgajdosAATTsuse.com - GraphicsMagick-CVE-2017-13063,13064.patch a renamed to GraphicsMagick-CVE-2017-13063,13064,13065.patch as it also fixes CVE-2017-13065 [bsc#1055038]
Wed Jan 24 13:00:00 2018 pgajdosAATTsuse.com - security update (bmp.c): * CVE-2018-5685 [bsc#1075939] + GraphicsMagick-CVE-2018-5685.patch
Tue Jan 16 13:00:00 2018 pgajdosAATTsuse.com - security update (png.c): * CVE-2017-9262 [bsc#1043353] * CVE-2017-9261 [bsc#1043354] * CVE-2017-11750 [bsc#1051442] * CVE-2017-12676 [bsc#1052708] * CVE-2017-12673 [bsc#1052717] * CVE-2017-12641 [bsc#1052777] * CVE-2017-12935 [bsc#1054600] * CVE-2017-13147 [bsc#1055374] * CVE-2017-13142 [bsc#1055455] * CVE-2017-14103 [bsc#1057000] * CVE-2017-15218 [bsc#1062752] * CVE-2017-11722 [bsc#1051411] * CVE-2017-18219 [bsc#1084060] * CVE-2017-18220 [bsc#1084062] * CVE-2018-16749 [bsc#1108282] + added GraphicsMagick-png.c-update.patch, 15288:5c4bd14a370c state of png.c
Tue Jan 9 13:00:00 2018 pgajdosAATTsuse.com - security update (core): * CVE-2017-18022 [bsc#1074975] + GraphicsMagick-CVE-2017-18022.patch
Mon Jan 8 13:00:00 2018 pgajdosAATTsuse.com - security update (mat.c): * CVE-2017-12672 [bsc#1052720] * CVE-2017-13060 [bsc#1055065] * CVE-2017-12670 [bsc#1052731] * CVE-2017-10800 [bsc#1047044] * CVE-2017-13648 [bsc#1055434] * CVE-2017-12564 [bsc#1052468] * CVE-2017-12675 [bsc#1052710] * CVE-2017-14326 [bsc#1058640] * CVE-2017-17881 [bsc#1074123] * CVE-2017-18029 [bsc#1076021] * CVE-2017-18027 [bsc#1076051] + added GraphicsMagick-mat.c-update.patch, 15288:5c4bd14a370c state of mat.c
Wed Jan 3 13:00:00 2018 pgajdosAATTsuse.com - security update (mpc.c): * CVE-2017-11449 [bsc#1049373] + GraphicsMagick-CVE-2017-11449.patch * CVE-2017-11641 [bsc#1050623] + GraphicsMagick-CVE-2017-11641.patch
Tue Jan 2 13:00:00 2018 pgajdosAATTsuse.com - security update (render.c): * CVE-2017-16547 [bsc#1067177] + GraphicsMagick-CVE-2017-16547.patch
Tue Jan 2 13:00:00 2018 pgajdosAATTsuse.com - security update (pwp.c): * memory leak in pwp.c [bsc#1051412] + GraphicsMagick-pwp.c-memory-leak.patch
Wed Dec 13 13:00:00 2017 pgajdosAATTsuse.com - security update (pnm.c): * CVE-2017-14042 [bsc#1056550] + GraphicsMagick-CVE-2017-14042.patch * CVE-2017-14504 [bsc#1059721] + GraphicsMagick-CVE-2017-14504.patch * CVE-2017-17498 [bsc#1072103] + GraphicsMagick-CVE-2017-17498.patch
Mon Dec 11 13:00:00 2017 pgajdosAATTsuse.com - security update (gif.c): * CVE-2017-15277 [bsc#1063050] + GraphicsMagick-CVE-2017-15277.patch
Wed Dec 6 13:00:00 2017 pgajdosAATTsuse.com - security update (rle.c): * CVE-2017-14733 [bsc#1060577] + GraphicsMagick-CVE-2017-14733.patch
Tue Dec 5 13:00:00 2017 pgajdosAATTsuse.com - security update (pdf.c): * CVE-2017-12662 [bsc#1052758] + GraphicsMagick-CVE-2017-12662.patch
Mon Dec 4 13:00:00 2017 pgajdosAATTsuse.com - security update (dcm.c): * CVE-2017-14994 [bsc#1061587] + GraphicsMagick-CVE-2017-14994.patch * CVE-2017-12140, CVE-2017-12644 [bsc#1052764] [bsc#1051847] + GraphicsMagick-CVE-2017-12140,12644.patch
Mon Dec 4 13:00:00 2017 pgajdosAATTsuse.com - security update (dpx.c): * CVE-2017-10799 [bsc#1047054] + GraphicsMagick-CVE-2017-10799.patch
Mon Nov 27 13:00:00 2017 pgajdosAATTsuse.com - security update (tiff.c) * CVE-2017-13737 [bsc#1056162] + GraphicsMagick-CVE-2017-13737.patch * CVE-2017-11640 [bsc#1050632] + GraphicsMagick-CVE-2017-11640.patch
Tue Nov 21 13:00:00 2017 pgajdosAATTsuse.com - security update (wpg.c): * CVE-2017-14342 [bsc#1058485] + GraphicsMagick-CVE-2017-14342.patch * CVE-2017-14341 [bsc#1058637] + GraphicsMagick-CVE-2017-14341.patch * CVE-2017-16546 [bsc#1067181] + GraphicsMagick-CVE-2017-16546.patch * CVE-2017-16545 [bsc#1067184] + GraphicsMagick-CVE-2017-16545.patch * CVE-2017-16669 [bsc#1067409] + GraphicsMagick-CVE-2017-16669.patch
Tue Nov 7 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-13776, CVE-2017-13777 [bsc#1056429], [bsc#1056426] + GraphicsMagick-CVE-2017-13776,13777.patch
Mon Nov 6 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-13134 [bsc#1055214] + GraphicsMagick-CVE-2017-13134.patch
Mon Nov 6 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-15930 [bsc#1066003] + GraphicsMagick-CVE-2017-15930.patch
Fri Nov 3 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-12983 [bsc#1054757] + GraphicsMagick-CVE-2017-12983.patch
Wed Nov 1 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-14165 [bsc#1057508] + GraphicsMagick-CVE-2017-14165.patch
Tue Oct 24 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-12936 [bsc#1054598] + GraphicsMagick-CVE-2017-12936.patch
Mon Oct 23 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-13139 [bsc#1055430] + GraphicsMagick-CVE-2017-13139.patch
Mon Oct 23 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-12937 [bsc#1054596] + GraphicsMagick-CVE-2017-12937.patch
Fri Oct 20 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-13063 [bsc#1055050], CVE-2017-13064 [bsc#1055042] + GraphicsMagick-CVE-2017-13063,13064.patch
Fri Oct 20 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-13775 [bsc#1056431] + GraphicsMagick-CVE-2017-13775.patch
Mon Oct 9 14:00:00 2017 pgajdosAATTsuse.com - ThrowException does not return [bsc#1061873c#6] + amended GraphicsMagick-CVE-2017-15033.patch
Fri Oct 6 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-15033 [bsc#1061873] + GraphicsMagick-CVE-2017-15033.patch
Thu Oct 5 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-14532 [bsc#1059663] + GraphicsMagick-CVE-2017-14532.patch
Tue Aug 15 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-11643 [bsc#1050611] + GraphicsMagick-CVE-2017-11643.patch * CVE-2017-11636 [bsc#1050674] + GraphicsMagick-CVE-2017-11636.patch
Fri Jul 21 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-11403 [bsc#1049072] + GraphicsMagick-CVE-2017-11403.patch
Mon Jun 26 14:00:00 2017 pgajdosAATTsuse.com - complementary fix for CVE-2017-8350 [bsc#1036985 c13-c21] * modified GraphicsMagick-CVE-2017-8350.patch
Tue May 30 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-9142 [bsc#1040304] + GraphicsMagick-CVE-2017-9142.patch
Wed May 3 14:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-8350 [bsc#1036985] + GraphicsMagick-CVE-2017-8350.patch * CVE-2017-8351 [bsc#1036986] + GraphicsMagick-CVE-2017-8351.patch * CVE-2017-13066 [bsc#1055010] + GraphicsMagick-CVE-2017-8353.patch * CVE-2017-8355 [bsc#1036990] + GraphicsMagick-CVE-2017-8355.patch
Tue Mar 21 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2017-6335 [bsc#1027255] + GraphicsMagick-CVE-2017-6335.patch
Tue Jan 17 13:00:00 2017 pgajdosAATTsuse.com - security update: * CVE-2016-10050 [bsc#1017312] + GraphicsMagick-CVE-2016-10050.patch * CVE-2016-10051 [bsc#1017313] + GraphicsMagick-CVE-2016-10051.patch * CVE-2016-10052 [bsc#1017314] + GraphicsMagick-CVE-2016-10052.patch * CVE-2016-10048 [bsc#1017310] + GraphicsMagick-CVE-2016-10048.patch * CVE-2016-10146 [bsc#1020443] + GraphicsMagick-CVE-2016-10146.patch * CVE-2017-5511 [bsc#1020448] + GraphicsMagick-CVE-2017-5511.patch * CVE-2016-10068 [bsc#1017324] + GraphicsMagick-CVE-2016-10068.patch * CVE-2016-10070 [bsc#1017326] + GraphicsMagick-CVE-2016-10070.patch - GraphicsMagick-buffer-overflow-pdb.patch corrected to GraphicsMagick-buffer-overflow-map.patch name
Tue Dec 13 13:00:00 2016 pgajdosAATTsuse.com - security update: * CVE-2016-8866 [bsc#1009318] + GraphicsMagick-CVE-2016-8866.patch * CVE-2016-9830 [bsc#1013640] + GraphicsMagick-CVE-2016-9830.patch
Tue Nov 29 13:00:00 2016 pgajdosAATTsuse.com - security update: * CVE-2016-5118 [bsc#982178] + GraphicsMagick-CVE-2016-5118.patch * CVE-2014-9805 [bsc#983752] + GraphicsMagick-CVE-2014-9805.patch * CVE-2014-9846 [bsc#983521] + GraphicsMagick-CVE-2014-9846.patch * CVE-2014-9807 [bsc#983794] + GraphicsMagick-CVE-2014-9807.patch * CVE-2014-9809 [bsc#983799] + GraphicsMagick-CVE-2014-9809.patch * CVE-2014-9815 [bsc#984372] + GraphicsMagick-CVE-2014-9815.patch * CVE-2014-9817 [bsc#984400] + GraphicsMagick-CVE-2014-9817.patch * CVE-2014-9820 [bsc#984150] + GraphicsMagick-CVE-2014-9820.patch * CVE-2014-9834 [bsc#984436] + GraphicsMagick-CVE-2014-9834.patch * CVE-2014-9835, CVE-2014-9831 [bsc#984145] [bsc#984375] + GraphicsMagick-CVE-2014-9835,9831.patch * CVE-2014-9837 [bsc#984166] + GraphicsMagick-CVE-2014-9837.patch * CVE-2014-9845 [bsc#984394] + GraphicsMagick-CVE-2014-9845.patch * CVE-2014-9817 [bsc#984400] + GraphicsMagick-CVE-2014-9853.patch * CVE-2016-7529 [bsc#1000399] + GraphicsMagick-CVE-2016-7529.patch * CVE-2016-7528 [bsc#1000434] + GraphicsMagick-CVE-2016-7528.patch * CVE-2016-7515 [bsc#1000689] + GraphicsMagick-CVE-2016-7515.patch * CVE-2016-7522 [bsc#1000698] + GraphicsMagick-CVE-2016-7522.patch * CVE-2016-7531 [bsc#1000704] + GraphicsMagick-CVE-2016-7531.patch * CVE-2016-7533 [bsc#1000707] + GraphicsMagick-CVE-2016-7533.patch * CVE-2016-7537 [bsc#1000711] + GraphicsMagick-CVE-2016-7537.patch * CVE-2016-6823 [bsc#1001066] + GraphicsMagick-CVE-2016-6823.patch * CVE-2016-7101 [bsc#1001221] + GraphicsMagick-CVE-2016-7101.patch * do not divide by zero in WriteTIFFImage [bsc#1002206] + GraphicsMagick-write-tiff-div-by-zero.patch * fix buffer overflow [bsc#1002209] + GraphicsMagick-buffer-overflow-pdb.patch * CVE-2016-7800 [bsc#1002422] + GraphicsMagick-CVE-2016-7800.patch * CVE-2016-7996, CVE-2016-7997 [bsc#1003629] + GraphicsMagick-CVE-2016-7996,7997.patch * CVE-2016-8684 [bsc#1005123] + GraphicsMagick-CVE-2016-8684.patch * CVE-2016-8682 [bsc#1005125] + GraphicsMagick-CVE-2016-8682.patch * CVE-2016-8683 [bsc#1005127] + GraphicsMagick-CVE-2016-8683.patch * CVE-2016-8862 [bsc#1007245] + GraphicsMagick-CVE-2016-8862.patch * CVE-2016-9556 [bsc#1011130] + GraphicsMagick-CVE-2016-9556.patch
Mon Sep 26 14:00:00 2016 pgajdosAATTsuse.com - update to 1.3.25: * EscapeParenthesis(): I was notified by Gustavo Grieco of a heap overflow in EscapeParenthesis() used in the text annotation code. While not being able to reproduce the issue, the implementation of this function is completely redone. * Utah RLE: Reject truncated/absurd files which caused huge memory allocations and/or consumed huge CPU. Problem was reported by Agostino Sarubbo based on testing with AFL. * SVG/MVG: Fix another case of CVE-2016-2317 (heap buffer overflow) in the MVG rendering code (also impacts SVG). * TIFF: Fix heap buffer read overflow while copying sized TIFF attributes. Problem was reported by Agostino Sarubbo based on testing with AFL.
Thu Jun 23 14:00:00 2016 meissnerAATTsuse.com - Build \"gm\" as position independend executable (PIE).
Mon Jun 6 14:00:00 2016 pgajdosAATTsuse.com - updated to 1.3.24: * many security related changes (incl. CVE-2016-5118), see ChangeLog - removed patches: * GraphicsMagick-CVE-2016-5118.patch * GraphicsMagick-upstream-delegates-safer.patch * GraphicsMagick-upstream-disable-mvg-ext.patch * GraphicsMagick-upstream-disable-tmp-magick-prefix.patch * GraphicsMagick-upstream-image-sanity-check.patch
Mon May 30 14:00:00 2016 pgajdosAATTsuse.com - security update: * CVE-2016-5118 [bsc#982178] + GraphicsMagick-CVE-2016-5118.patch
Mon May 9 14:00:00 2016 sfleesAATTsuse.de - Multiple security issues in GraphicsMagick/ImageMagick [boo#978061] (CVE-2016-3714, CVE-2016-3718, CVE-2016-3715, CVE-2016-3717) * GraphicsMagick-upstream-delegates-safer.patch * GraphicsMagick-upstream-disable-mvg-ext.patch * GraphicsMagick-upstream-disable-tmp-magick-prefix.patch * GraphicsMagick-upstream-image-sanity-check.patch
Sun Nov 8 13:00:00 2015 dmitry_rAATTopensuse.org - Update to version 1.3.23 * See included NEWS.txt for details
Mon Oct 5 14:00:00 2015 dmitry_rAATTopensuse.org - Update to version 1.3.22 * See included NEWS.txt for details
Sat Mar 21 13:00:00 2015 dmitry_rAATTopensuse.org - Update to version 1.3.21 * See included NEWS.txt for details
Wed Sep 17 14:00:00 2014 dmitry_rAATTopensuse.org - Move library configuration files to separated package
Tue Sep 16 14:00:00 2014 dmitry_rAATTopensuse.org - Fix devel package dependencies
Sat Sep 13 14:00:00 2014 dmitry_rAATTopensuse.org - Update to version 1.3.20 * See included NEWS.txt for details - Enable quantum depth in shared library names - Enable bzip2, jbig, webp support - Use LCMSv2
Tue Feb 25 13:00:00 2014 dmitry_rAATTopensuse.org - Fix quantum depth in package description
Thu Jan 2 13:00:00 2014 pgajdosAATTsuse.com - updated to 1.3.19: * EPT: Fix crash observed when Ghostscript fails to produce useful output. This was particularly noticeable when Ghostscript was not installed. This crash could be used to cause denial of service. * PNG: With libpng 1.6.X, avoid a crash while copying a PNG with a \"known incorrect ICC profile\". This crash could be used to cause denial of service. * etc. see NEWS.txt
Mon Jul 15 14:00:00 2013 pgajdosAATTsuse.com - set quantum depth to 16 [bnc#828380]
Tue Mar 12 13:00:00 2013 pgajdosAATTsuse.com - updated to 1.3.18: * Due to `GCC bug 53967`_, several key agorithms (e.g. convolution) may execute much faster (e.g. 2-3X) for x86-64 and/or when SSE is enabled for floating point math (`-mfpmath=sse`) if the GCC option `-frename-registers` is used. Default 32-bit builds do not experience the problem since they use \'387 math. It is not clear in what version of GCC this problem started but it was not noticed by the developers until the GCC 4.6 timeframe. Other compilers do not suffer from this bug. * Fixed bug with format substitutions if input string ends with a single \'%\'. * BMP: Fixed an old bug with decoding chromaticity primaries. * PNG: Fixed reading of interlaced images. Fix reading of sub-8-bit palette and grayscale images. Some PNG sub-formats were written incorrectly. Fix crash in PNG8 writer if image colors happened to be non-zero but image was not actually colormapped. * PNG: Configure script now also searches for libpng versions 16 and 17. * TIFF: Fix a crash which was noticed when writing RGBA separated (planar) format. * `--enable-symbol-prefix` was not prefixing all of the C symbols. Some core C library functions were not prefixed. This option applies to the Wand library API as well now. * C API: When input is from a user-provided file descriptor, the file position is restored after reading the file header bytes. Previously the file position was rewound to the beginning of the file. This allows reading embedded image data from the current offset in a file, and allows continuing to use the stream after GraphicsMagick has returned the image. * C API: It is now possible to invoke CloseBlob() multiple times. * etc. see NEWS.txt
Mon Oct 15 14:00:00 2012 pgajdosAATTsuse.com - updated to 1.3.17: * PNG: Fix for CVE-2012-3438. The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation. * PNG: Reading sub-8-bit palette images is fixed (images looked stretched). * SVG: Fixed bug which allowed MVG and SVG files with long vector paths to crash the software. * SVG: Ignore XML headers rather than rendering them as text. * MVG/SVG/WMF/-draw: It is now possible to draw a plain \',\' character. * etc., see NEWS.txt
Tue Jul 31 14:00:00 2012 pgajdosAATTsuse.com - fixed PerlMagick/Makefile.PL.in [bnc#771540]
Mon Jun 25 14:00:00 2012 pgajdosAATTsuse.com - updated to 1.3.16: Security Fixes: * Don\'t translate \'comment\' and \'label\' attributes if the request is made while a file is being read. Only translate such attributes if they come from the command line or API user. Bug fixes: * SWT: SWT reader suffered from a number of implementation errors which caused it not to work any more. Works again. * XBM: Fix memory leak observed when reading file in \'ping\' mode. * Support -trim on images which use a consistent (single color) transparent background. In this case, trim is done based on opacity rather than foreground color. * Include in order to assure that \'size_t\' and \'ssize_t\' are declared. This is necessary since MagickExtentImage() uses these types as part of its definition. * +repage was not working because parser was insisting that it should include an argument. (i.e. multiplying rather than dividing). * PerlMagick: Fix compilation with Perl 5.16. * PingBlob(): PingBlob was not working for all cases. Is now based on BlobToImage() for assured reliability. Feature improvements: * MAT: Animated movies inside 4D matrices are loaded now. * PDF: File base name is used as the document title. * PNG: Fix issues observed specifically with libpng 1.5.10. Performance Improvements: * Pixel iterators should be more efficient now if the image uses a file-backed cache. * Motion blur algorithm does scale well as cores are added so include OpenMP support for it by default.
Mon Jun 4 14:00:00 2012 pgajdosAATTsuse.com - added PerlMagick/typemap to build module with perl 5.16; to be removed for 1.4.0
Wed May 2 14:00:00 2012 pgajdosAATTsuse.com - updated to 1.3.15: Bug fixes: * PNG - fixed problem with bit depth when the encoder decides to write RGBA instead of indexed PNG. * Fixed some temporary file leaks which were caused by the temporary file name being automatically extended to include a scene number, and therefore fail to be deleted. New Features: * Added \'+noise random\' and \'-operator noise-random\' to \'convert\' and \'mogrify\'. This modulates the existing image data with uniformely random noise. * Added -strip option in composite, convert, mogrify, and montage to remove all profiles and text attributes from the image. * Added -repage option to composite, convert, mogrify, and montage subcommands to reset or adjust the current image page offsets based on a provided geometry specification. * New C function StripImage() to remove all profiles and text attributes from the image. * New C function ResetImagePage() to adjust the current image page canvas and position based on a relative page specification. * C functions GenerateDifferentialNoise(), AddNoiseImageChannel(), QuantumOperatorRegionImage(), AddNoiseImage() updated to support RandomNoise enumeration. * New C++ Image method strip(), and unary function stripImage() to remove all profiles and text attributes from the image. * XCF format now respects image subimage and subrange members so that returned image layers may be selected. * The INFO coder (e.g. output file \"info:-\") now respects the - format option so that its output may be adjusted identically to how -format works for \'identify\'. * TclMagick now supports Random noise. Feature improvements: * C function ThumbnailImage() now allows the user to override the filter used, but still defaults to using the box filter. Behavior Changes: * No longer add a printf-style scene formatting specification to filenames which do not have one and no longer automatically operate in \'adjoin\' mode in such cases. If multiple numbered files are intended to be output, then add +adjoin to the command line and use an output filename specification similar to \"image-%d.jpg\". Output files are now completely specified and predictable but this may break some existing usages which anticipate the automatic file numbering.
Mon Feb 27 13:00:00 2012 pgajdosAATTsuse.com - updated to 1.3.14: Bug fixes: * TGA format: Assume that 32-bit TGA files have an alpha channel, even if they are not marked as such. * XCF format: Fix reading XCF which is comprised of different sized layers. * JPEG & CineonLog: Convert RGB-compatible colorspaces (e.g. CineonLog) to RGB by default since that was the case prior to release 1.3.13. * RAW formats: Small memory leak in dcraw module was fixed. * Resize: ResizeImage() was ignoring its resize filter argument and was using the filter setting from the Image structure instead. * The mirror virtual pixel method was broken. New Features: * Open64 Compiler Suite: Version 5.0 is fully supported. * Wand API: Added MagickExtentImage(). * MEF RAW: Mamiya Photo RAW \"MEF\" format is now supported. Feature improvements: * DPX format: Original file endianness is preserved by default. Performance Improvements: * Despeckle algorithm (-despeckle) is many times faster. Behavior Changes: * DPX format: Original file endianness is preserved by default.
Tue Dec 27 13:00:00 2011 pgajdosAATTsuse.com - updated to 1.3.13: * In I/O blob, don\'t rewind already open file handle passed to OpenBlob() since we don\'t know the intended state of this file handle, and because it prevents appending to an existing file. * In AppendImageProfile(), don\'t leak profile buffer while appending a chunk to an existing profile. * Fix deadlock in ClonePixelCache() which was caused by using the same semaphore pointer in the source and destination images. * etc. see NEWS.txt - disabled perl.patch
Mon Apr 11 14:00:00 2011 pgajdosAATTsuse.cz - removed dependency of devel packages on the main package [bnc#685755]
Wed Dec 22 13:00:00 2010 neptuniaAATTmail.ru - restoring *-config scripts as in upstream version: their removal breaks older software
Tue Dec 14 13:00:00 2010 cristian.rodriguezAATTopensuse.org - package no longer requires -fno-strict-aliasins - fix -devel package dependencies - run make check - exclude *-config scripts, whatever uses them _must_ use pkgconfig to avoid the mess this scripts create.
Mon Jul 12 14:00:00 2010 pgajdosAATTsuse.cz - added xorg-x11-fonts as runtime dependency [bnc#619103]
Tue Mar 9 13:00:00 2010 pgajdosAATTsuse.cz - updated to version 1.3.12: * Filter mode (write to stdout) was completely broken. * Should now compile with libpng 1.4. * DCX output format is only written on request. Previously the PCX coder would automatically switch to DCX format if multiple frames would be written.
Tue Feb 23 13:00:00 2010 pgajdosAATTsuse.cz - updated to version 1.3.11: * Fixed array underflow on systems using signed char which could result in a program crash due to extended characters in filenames or in certain file formats. * Fixed array underflow on systems using signed char which could result in a program crash due to extended characters in filenames or in certain file formats. * Added a -thumbnail command to \'convert\' and \'mogrify\'. This is a faster way to scale down the image when speed is a primary concern. * Added a -extent command to \'convert\' and \'mogrify\' which composites the image on top of a backing canvas image of solid color. * Added support for -compose to the \'convert\' and \'mogrify\', which were documented to support it (but did not). * Requests for \'Over\' and \'Atop\' composition are converted to a request for the (faster) \'Copy\' composition when both images are opaque.
Mon Feb 15 13:00:00 2010 pgajdosAATTsuse.cz - updated to version 1.3.10: * +adjoin was not working correctly for the case when only one image frame is present. With +adjoin and writing one frame to \"foo%d.jpg\" it was outputting \"foo%d.jpg\" rather than \"foo0.jpg\". * When drawing paths, memory allocation for the points was much larger than it needed to be (patch by Vladimir Lukianov). * To reiterate the change which first appeared in 1.3.9, there is no longer an implicit +adjoin if the output file name happens to contain a %d sequence, or there are multiple frames and the output file format only supports storing one frame. Specify +adjoin if scene number substition is desired in the output file names.
Mon Feb 8 13:00:00 2010 pgajdosAATTsuse.cz - updated to version 1.3.9: * There is no longer an implicit \'adjoin\' if an output filename contains an apparent scene specification (e.g. foo%02d.tiff) and multiple files are not needed to save the image.. It is necessary to use +adjoin. For example ``gm convert foo.pdf +adjoin %02d.tiff``. * For formats which support multiple frames, output with +adjoing to filenames containing a scene specification (e.g. foo%02d.tiff) was resulting in wrong output file names. * -flatten now applies the image background color under the first image in the list if it is not already opaque. * Fix \"double free\" error when using gm import -frame. * XPM does not support RGBA color syntax, so return RGB instead. * The display \'-update\' option was only working in conjunction with the \'-delay\' option with a delay setting of 2 or greater. * -convolve was crashing rather than reporting an error. * Fixed crash if the number of OpenMP threads was reduced from the original value via \'-limit threads\' or omp_set_num_threads(). * -blur was not blurring the opacity channel for solid-color images. * Several deleted global string constants are restored with deprecated status in order to assure that symbols are not removed from the ABI.
Mon Jan 25 13:00:00 2010 pgajdosAATTsuse.cz - updated to version 1.3.8: Security Fixes: * Fix for CVE-2009-1882 \"Integer overflow in the XMakeImage function\". * Fix lockup due to hanging in loop while parsing malformed sub-image specification (SourceForge issue 2886560). * Libltdl: Updated libtool to 2.2.6b in order to fix security issue. Resolves CVE-2009-3736 as it pertains to GraphicsMagick. Bug fixes: * -convolve, -recolor: Validate that user-provided matrix is square when parsing -convolve and -recolor commands in order to avoid a core dump. * CALS: Reading images taller than the image width resulted in a failure. * ConstituteImage(), DispatchImage(): \'A\' and \'T\' should indicate transparency and \'O\' should indicate opacity. Behavior was inconsistent. In some cases \'O\' meant transparency while in other cases it meant opacity. Also, in a few cases, matte was not getting enabled in the image as it should. * DCRAW: Module name was not registered so modules based builds were not supporting formats provided via \'dcraw\'. * GetOptimalKernelWidth1D(), GetOptimalKernelWidth2D(): In the Q32 build, convolution kernel size was estimated incorrectly for large sigmas on 32-bit systems due to arithmetic overflow. This could cause wrong results for -convolve, -blur, -sharpen, and other algorithms which use these functions. etc., see NEWS.txt
Mon Nov 23 13:00:00 2009 pgajdosAATTsuse.cz - updated to version 1.3.7 (see ChangeLog)
Tue Nov 3 13:00:00 2009 cooloAATTnovell.com - updated patches to apply with fuzz=0
Tue Aug 4 14:00:00 2009 pgajdosAATTsuse.cz - updated to 1.2.7: - Bug fixes: * VID: Eliminate memory leak. * montage: Eliminate use of freed memory. * delegates.mgk: Fix hang when co-process is invoked. * identify: Return comment text of any size. * ConvolveImage: Correctly log the convolution kernel used. - Feature improvements: * Convert: Re-implement -write so that it works in a useful fashion. - Performance improvments: * TIFF: Ping mode (\'identify\') is now really fast.
|
|
|