./graphics/jbigkit, JBIG-KIT lossless image compression library

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2014Q1, Version: 2.1, Package name: jbigkit-2.1, Maintainer: obache

JBIG-KIT implements a highly effective data compression algorithm for
bi-level high-resolution images such as fax pages or scanned
documents.

JBIG-KIT provides a portable library of compression and decompression
functions with a documented interface. You can very easily include
into your image or document processing software. In addition, JBIG-KIT
provides ready-to-use compression and decompression programs with a
simple command line interface (similar to the converters found in Jef
Poskanzer's PBM graphics file conversion package).


Master sites:

SHA1: 4864646df004e8331d19f2fa103ed731fdb6c099
RMD160: 71cc51fce3f65d8d9abf9ff52c29edf5469eb52f
Filesize: 428.428 KB

Version history: (Expand)


CVS history: (Expand)


   2014-04-11 13:50:10 by Matthias Scheler | Files touched by this commit (5) | Package updated
Log message:
Pullup ticket #4363 - requested by obache
graphics/jbigkit: security update

Revisions pulled up:
- graphics/jbigkit/Makefile                                     1.6
- graphics/jbigkit/distinfo                                     1.5
- graphics/jbigkit/patches/patch-Makefile                       1.2
- graphics/jbigkit/patches/patch-aa                             1.4
- graphics/jbigkit/patches/patch-ab                             1.5

---
   Module Name:	pkgsrc
   Committed By:	obache
   Date:		Thu Apr 10 12:04:16 UTC 2014

   Modified Files:
   	pkgsrc/graphics/jbigkit: Makefile distinfo
   	pkgsrc/graphics/jbigkit/patches: patch-Makefile patch-aa patch-ab

   Log message:
   Update jbigkit to 2.1.

   Changes in version 2.1 (2014-04-08)

   This is a security-critical bug-fix release that remains API and ABI
   backwards compatible to version 2.0. Users who process BIE data from
   untrusted sources should upgrade.

     - fixed a buffer-overflow vulnerability in the jbig.c decoder,
       reported by Florian Weimer (Red Hat): CVE-2013-6369

     - fixed ability of corrupted input data to force jbig85.c decoder
       into an end-less loop

     - fixed a bug in the processing of private deterministic-prediction
       tables (DPPRIV=3D1) in jbig.c decoder

     - fixed integer-type mismatches in printf arguments on 64-bit systems

     - fuzz-testing script added