View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/imagemagick
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-01-08 22:41:42 UTC 2019-01-08
DSC file for 8:6.9.10.23+dfsg-2

Author: Ubuntu Git Importer
Author Date: 2019-01-08 22:41:42 UTC

DSC file for 8:6.9.10.23+dfsg-2

debian/buster 2019-01-08 22:33:46 UTC 2019-01-08
Import patches-unapplied version 8:6.9.10.23+dfsg-2 to debian/sid

Author: Bastien Roucariès
Author Date: 2019-01-08 14:08:25 UTC

Import patches-unapplied version 8:6.9.10.23+dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 69f7b6b5ca22c78b35a6b5df972de9578268ea16

New changelog entries:
  * Bug fix: "identify 6.9.10-23 does not convert units (pixels per
    cm/in)", thanks to Cédric Boutillier (Closes: #918642).

applied/debian/buster 2019-01-08 22:33:46 UTC 2019-01-08
Import patches-applied version 8:6.9.10.23+dfsg-2 to applied/debian/sid

Author: Bastien Roucariès
Author Date: 2019-01-08 14:08:25 UTC

Import patches-applied version 8:6.9.10.23+dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5cc6be3d12ed431a276166590d4218fbec9ce8f7
Unapplied parent: 39e55b9a7ccc445643ecd9c4f9a5e47a7584b09c

New changelog entries:
  * Bug fix: "identify 6.9.10-23 does not convert units (pixels per
    cm/in)", thanks to Cédric Boutillier (Closes: #918642).

applied/debian/sid 2019-01-08 22:33:46 UTC 2019-01-08
Import patches-applied version 8:6.9.10.23+dfsg-2 to applied/debian/sid

Author: Bastien Roucariès
Author Date: 2019-01-08 14:08:25 UTC

Import patches-applied version 8:6.9.10.23+dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 5cc6be3d12ed431a276166590d4218fbec9ce8f7
Unapplied parent: 39e55b9a7ccc445643ecd9c4f9a5e47a7584b09c

New changelog entries:
  * Bug fix: "identify 6.9.10-23 does not convert units (pixels per
    cm/in)", thanks to Cédric Boutillier (Closes: #918642).

debian/sid 2019-01-08 22:33:46 UTC 2019-01-08
Import patches-unapplied version 8:6.9.10.23+dfsg-2 to debian/sid

Author: Bastien Roucariès
Author Date: 2019-01-08 14:08:25 UTC

Import patches-unapplied version 8:6.9.10.23+dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 69f7b6b5ca22c78b35a6b5df972de9578268ea16

New changelog entries:
  * Bug fix: "identify 6.9.10-23 does not convert units (pixels per
    cm/in)", thanks to Cédric Boutillier (Closes: #918642).

importer/ubuntu/dsc 2018-12-19 10:38:07 UTC 2018-12-19
DSC file for 8:6.9.10.14+dfsg-7ubuntu2

Author: Ubuntu Git Importer
Author Date: 2018-12-19 10:38:07 UTC

DSC file for 8:6.9.10.14+dfsg-7ubuntu2

ubuntu/disco 2018-12-19 10:18:11 UTC 2018-12-19
Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-pr...

Author: Balint Reczey
Author Date: 2018-12-18 19:12:23 UTC

Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 61f6b0db95cdc76247442907b147df0ea1317853

New changelog entries:
  * Revert hidden ABI break by changing MagickFloatType's size on i386

ubuntu/disco-proposed 2018-12-19 10:18:11 UTC 2018-12-19
Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-pr...

Author: Balint Reczey
Author Date: 2018-12-18 19:12:23 UTC

Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 61f6b0db95cdc76247442907b147df0ea1317853

New changelog entries:
  * Revert hidden ABI break by changing MagickFloatType's size on i386

ubuntu/disco-devel 2018-12-19 10:18:11 UTC 2018-12-19
Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-pr...

Author: Balint Reczey
Author Date: 2018-12-18 19:12:23 UTC

Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 61f6b0db95cdc76247442907b147df0ea1317853

New changelog entries:
  * Revert hidden ABI break by changing MagickFloatType's size on i386

ubuntu/devel 2018-12-19 10:18:11 UTC 2018-12-19
Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-pr...

Author: Balint Reczey
Author Date: 2018-12-18 19:12:23 UTC

Import patches-unapplied version 8:6.9.10.14+dfsg-7ubuntu2 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 61f6b0db95cdc76247442907b147df0ea1317853

New changelog entries:
  * Revert hidden ABI break by changing MagickFloatType's size on i386

debian/stretch 2018-11-10 17:02:36 UTC 2018-11-10
Import patches-unapplied version 8:6.9.7.4+dfsg-11+deb9u6 to debian/stretch

Author: Moritz Mühlenhoff
Author Date: 2018-10-10 22:09:33 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-11+deb9u6 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: f96e6b580f748d50297f15a997eb58a9d334958c

New changelog entries:
  * CVE-2018-16412
  * CVE-2018-16413
  * CVE-2018-16642
  * CVE-2018-16644
  * CVE-2018-16645
  * 0113-CVE-2018-12599 (Closes: #902727)
  * 0114-CVE-2018-11251
  * 0115-CVE-2018-12600 (Closes: #902728)
  * 0116-CVE-2018-5248 (Closes: #886588)
  * CVE-2017-12877 (Closes: #872373)
  * CVE-2017-16546 (Closes: #881392)
  * CVE-2017-17499
  * CVE-2017-17504
  * CVE-2017-17879 (Closes: #885125)

applied/debian/stretch 2018-11-10 17:02:36 UTC 2018-11-10
Import patches-applied version 8:6.9.7.4+dfsg-11+deb9u6 to applied/debian/str...

Author: Moritz Mühlenhoff
Author Date: 2018-10-10 22:09:33 UTC

Import patches-applied version 8:6.9.7.4+dfsg-11+deb9u6 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 7e379d53f6e4339b0292825bb26eedcb1178849d
Unapplied parent: 762605c0c3eb923f6744266d189ad05a770e1866

New changelog entries:
  * CVE-2018-16412
  * CVE-2018-16413
  * CVE-2018-16642
  * CVE-2018-16644
  * CVE-2018-16645
  * 0113-CVE-2018-12599 (Closes: #902727)
  * 0114-CVE-2018-11251
  * 0115-CVE-2018-12600 (Closes: #902728)
  * 0116-CVE-2018-5248 (Closes: #886588)
  * CVE-2017-12877 (Closes: #872373)
  * CVE-2017-16546 (Closes: #881392)
  * CVE-2017-17499
  * CVE-2017-17504
  * CVE-2017-17879 (Closes: #885125)

ubuntu/bionic-updates 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-...

Author: Steve Beattie
Author Date: 2018-09-28 18:19:24 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b1a6a4c5f8810ca8816eef694d86e5129a2d86b3

New changelog entries:
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: uninitialized variable usage in ReadMATImageV4
    - debian/patches/CVE-2018-14551.patch: initialize variable
    - CVE-2018-14551
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750

ubuntu/bionic-devel 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-...

Author: Steve Beattie
Author Date: 2018-09-28 18:19:24 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b1a6a4c5f8810ca8816eef694d86e5129a2d86b3

New changelog entries:
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: uninitialized variable usage in ReadMATImageV4
    - debian/patches/CVE-2018-14551.patch: initialize variable
    - CVE-2018-14551
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750

ubuntu/xenial-updates 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-28 18:19:54 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 773c0f3b63c559fae211137159d849599c506430

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-2.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0261-CVE-2017-13144.patch: removed pending
      further investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/xenial-security 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-28 18:19:54 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 773c0f3b63c559fae211137159d849599c506430

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-2.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0261-CVE-2017-13144.patch: removed pending
      further investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/xenial-devel 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Author: Steve Beattie
Author Date: 2018-09-28 18:19:54 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu5.13 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 773c0f3b63c559fae211137159d849599c506430

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-2.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0261-CVE-2017-13144.patch: removed pending
      further investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/trusty-devel 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-secu...

Author: Steve Beattie
Author Date: 2018-09-28 18:21:01 UTC

Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 1aab96bf31e9adb33a83f8f3b5f75a6375f9aa33

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a bad
      depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: make
      ReadRectangle() a boolean returning function and use it.
    - debian/patches/CVE-2018-16644-prereq-2.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-3.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0297-CVE-2017-13144.patch: removed pending further
      investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/trusty-security 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-secu...

Author: Steve Beattie
Author Date: 2018-09-28 18:21:01 UTC

Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 1aab96bf31e9adb33a83f8f3b5f75a6375f9aa33

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a bad
      depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: make
      ReadRectangle() a boolean returning function and use it.
    - debian/patches/CVE-2018-16644-prereq-2.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-3.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0297-CVE-2017-13144.patch: removed pending further
      investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/trusty-updates 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-secu...

Author: Steve Beattie
Author Date: 2018-09-28 18:21:01 UTC

Import patches-unapplied version 8:6.7.7.10-6ubuntu3.13 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 1aab96bf31e9adb33a83f8f3b5f75a6375f9aa33

New changelog entries:
  [ Steve Beattie ]
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a bad
      depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437-prereq.patch: check for negative
      values
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640-prereq-1.patch: define DestroyJNG()
    - debian/patches/CVE-2018-16640-prereq-2.patch: fix DestroyJNG()
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: make
      ReadRectangle() a boolean returning function and use it.
    - debian/patches/CVE-2018-16644-prereq-2.patch: check for EOF
      when reading from file
    - debian/patches/CVE-2018-16644-prereq-3.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750
  [ Marc Deslauriers ]
  * SECURITY REGRESSION: segfault in png to gif conversion (LP: #1793485)
    - debian/patches/0297-CVE-2017-13144.patch: removed pending further
      investigation.
    - debian/patches/CVE-2017-12430.patch: refreshed.

ubuntu/bionic-security 2018-10-04 22:28:15 UTC 2018-10-04
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-...

Author: Steve Beattie
Author Date: 2018-09-28 18:19:24 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b1a6a4c5f8810ca8816eef694d86e5129a2d86b3

New changelog entries:
  * SECURITY UPDATE: code execution vulnerabilities in ghostscript as
    invoked by imagemagick
    - debian/patches/200-disable-ghostscript-formats.patch: disable
      ghostscript handled types by default in policy.xml
  * SECURITY UPDATE: information leak in ReadXBMImage
    - debian/patches/CVE-2018-16323.patch: don't leave data
      uninitialized with negative pixels
    - CVE-2018-16323
  * SECURITY UPDATE: uninitialized variable usage in ReadMATImageV4
    - debian/patches/CVE-2018-14551.patch: initialize variable
    - CVE-2018-14551
  * SECURITY UPDATE: memory leak of colormap in WriteMPCImage
    - debian/patches/CVE-2018-14434.patch: free colormap on bad
      color depth
    - CVE-2018-14434
  * SECURITY UPDATE: memory leak in DecodeImage
    - debian/patches/CVE-2018-14435.patch: free memory when given a
      bad plane
    - CVE-2018-14435
  * SECURITY UPDATE: memory leak in ReadMIFFImage
    - debian/patches/CVE-2018-14436.patch: free memory when given a
      bad depth
    - CVE-2018-14436
  * SECURITY UPDATE: memory leak in parse8BIM
    - debian/patches/CVE-2018-14437.patch: free strings in error
      conditions
    - CVE-2018-14437
  * SECURITY UPDATE: memory leak in ReadOneJNGImage
    - debian/patches/CVE-2018-16640.patch: free memory on error
    - CVE-2018-16640
  * SECURITY UPDATE: denial of service due to out-of-bounds write
    in InsertRow
    - debian/patches/CVE-2018-16642.patch: improve checking for errors
    - CVE-2018-16642
  * SECURITY UPDATE: denial of service due to missing fputc checks
    - debian/patches/CVE-2018-16643.patch: check fputc calls for error
    - CVE-2018-16643
  * SECURITY UPDATE: denial of service in ReadDCMImage and
    ReadPICTImage
    - debian/patches/CVE-2018-16644-prereq-1.patch: define
      ThrowPICTException() macro and use it
    - debian/patches/CVE-2018-16644-1.patch,
      debian/patches/CVE-2018-16644-2.patch: check for invalid length
    - CVE-2018-16644
  * SECURITY UPDATE: excessive memory allocation issue in ReadBMPImage
    - debian/patches/CVE-2018-16645.patch: ensure number_colors is
      not too large
    - CVE-2018-16645
  * SECURITY UPDATE: denial of service in ReadOneJNGImage
    - debian/patches/CVE-2018-16749.patch; check for NULL color_image
    - CVE-2018-16749
  * SECURITY UPDATE: memory leak in formatIPTCfromBuffer
    - debian/patches/CVE-2018-16750.patch: free memory on error
    - CVE-2018-16750

ubuntu/cosmic 2018-08-28 14:58:19 UTC 2018-08-28
Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-pr...

Author: Corey Bryant
Author Date: 2018-08-28 13:45:08 UTC

Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 162e99cfaacc8eed66836c1610d30967be6c0ab9

New changelog entries:
  * Stop installing the Debian-specific .desktop for the display program.
    (LP: #1740741, LP: #1740743, LP: #1717951, LP: #1615435,
    Closes: #675617, #677318)

ubuntu/cosmic-proposed 2018-08-28 14:58:19 UTC 2018-08-28
Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-pr...

Author: Corey Bryant
Author Date: 2018-08-28 13:45:08 UTC

Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 162e99cfaacc8eed66836c1610d30967be6c0ab9

New changelog entries:
  * Stop installing the Debian-specific .desktop for the display program.
    (LP: #1740741, LP: #1740743, LP: #1717951, LP: #1615435,
    Closes: #675617, #677318)

ubuntu/cosmic-devel 2018-08-28 14:58:19 UTC 2018-08-28
Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-pr...

Author: Corey Bryant
Author Date: 2018-08-28 13:45:08 UTC

Import patches-unapplied version 8:6.9.10.8+dfsg-1ubuntu2 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 162e99cfaacc8eed66836c1610d30967be6c0ab9

New changelog entries:
  * Stop installing the Debian-specific .desktop for the display program.
    (LP: #1740741, LP: #1740743, LP: #1717951, LP: #1615435,
    Closes: #675617, #677318)

ubuntu/artful-security 2018-07-11 12:18:16 UTC 2018-07-11
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-...

Author: Marc Deslauriers
Author Date: 2018-07-10 14:09:43 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8b447f17ac8decf99cd07f810c58de82730793a1

New changelog entries:
  * SECURITY UPDATE: out-of-bounds write in ReadBMPImage and WriteBMPImage
    - debian/patches/CVE-2018-12599.patch: use proper lengths in
      coders/bmp.c.
    - CVE-2018-12599
  * SECURITY UPDATE: out-of-bounds write in ReadDIBImage and WriteDIBImage
    - debian/patches/CVE-2018-12600.patch: use proper lengths in
      coders/dib.c.
    - CVE-2018-12600
  * SECURITY UPDATE: memory leak in XMagickCommand
    - debian/patches/CVE-2018-13153.patch: free memory in magick/animate.c.
    - CVE-2018-13153

ubuntu/artful-updates 2018-07-11 12:18:16 UTC 2018-07-11
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-...

Author: Marc Deslauriers
Author Date: 2018-07-10 14:09:43 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8b447f17ac8decf99cd07f810c58de82730793a1

New changelog entries:
  * SECURITY UPDATE: out-of-bounds write in ReadBMPImage and WriteBMPImage
    - debian/patches/CVE-2018-12599.patch: use proper lengths in
      coders/bmp.c.
    - CVE-2018-12599
  * SECURITY UPDATE: out-of-bounds write in ReadDIBImage and WriteDIBImage
    - debian/patches/CVE-2018-12600.patch: use proper lengths in
      coders/dib.c.
    - CVE-2018-12600
  * SECURITY UPDATE: memory leak in XMagickCommand
    - debian/patches/CVE-2018-13153.patch: free memory in magick/animate.c.
    - CVE-2018-13153

ubuntu/artful-devel 2018-07-11 12:18:16 UTC 2018-07-11
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-...

Author: Marc Deslauriers
Author Date: 2018-07-10 14:09:43 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2.3 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8b447f17ac8decf99cd07f810c58de82730793a1

New changelog entries:
  * SECURITY UPDATE: out-of-bounds write in ReadBMPImage and WriteBMPImage
    - debian/patches/CVE-2018-12599.patch: use proper lengths in
      coders/bmp.c.
    - CVE-2018-12599
  * SECURITY UPDATE: out-of-bounds write in ReadDIBImage and WriteDIBImage
    - debian/patches/CVE-2018-12600.patch: use proper lengths in
      coders/dib.c.
    - CVE-2018-12600
  * SECURITY UPDATE: memory leak in XMagickCommand
    - debian/patches/CVE-2018-13153.patch: free memory in magick/animate.c.
    - CVE-2018-13153

applied/debian/experimental 2018-07-02 16:26:03 UTC 2018-07-02
Import patches-applied version 8:6.9.10.2+dfsg-1 to applied/debian/experimental

Author: Bastien Roucariès
Author Date: 2018-06-25 12:29:02 UTC

Import patches-applied version 8:6.9.10.2+dfsg-1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 1fa39c4ea0e14166720f9e227403fbee45ff2162
Unapplied parent: 75da47f2bacb65d94e3cee7dc4ece0bfb9af5a10

New changelog entries:
  * Bug fix: "FTBFS on i386: testsuite failure in Magick++/tests/tests.tap
    2", thanks to Sven Joachim (Closes: #893953).
  * Bug fix: "drop libtool-bin from Build-Depends", thanks to Helmut
    Grohne (Closes: #893925).
  * Move to git dpm
  * Move to salsa
  * SO dump
  * Fix security bugs:
    + CVE-2018-9133: Excessive iteration in the DecodeLabImage
      and EncodeLabImage functions (coders/tiff.c), which results
      in a hang (tens of minutes) with a tiny PoC file.
      Remote attackers could leverage this vulnerability
      to cause a denial of service via a crafted tiff file.
      (Closes: #894848)
    + CVE-2018-9133: SetGrayscaleImage in the quantize.c file
      allows attackers to cause a heap-based buffer over-read
      via a crafted file.
    + CVE-2018-11624: the ReadMATImage function in coders/mat.c
      allows attackers to cause a use after free via a crafted file.
    + CVE-2018-11625: the SetGrayscaleImage in the quantize.c
      file allows attackers to cause a heap-based buffer over-read
      via a crafted file.
    + CVE-2018-10177: An infinite loop is present in the
      ReadOneMNGImage function of the coders/png.c file.
      Remote attackers could leverage this vulnerability
      to cause a denial of service via a crafted mng file.
    + CVE-2017-14528: Tested (with and without valgrind) and found immune.
      The TIFFSetProfiles function in coders/tiff.c has incorrect
      expectations about whether LibTIFF TIFFGetField return values
      imply that data validation has occurred, which allows remote attackers
      to cause a denial of service (use-after-free after an invalid call
      to TIFFSetField, and application crash) via a crafted file.
    + CVE-2018-11624: heap-based buffer over-read in IsWEBPImageLossless
      in coders/webp.c.
    + CVE-2018-10805: a memory leak in ReadYCBCRImage in coders/ycbcr.c.
      (Closes: #898218).
    + CVE-2018-10804: a memory leak in WriteTIFFImage in coders/tiff.c.
      (Closes: #898217)
    + CVE-2018-12599: the ReadBMPImage and WriteBMPImage functions
      in coders/bmp.c allow attackers to cause an out of bounds write
      via a crafted file.
    + CVE-2018-12600: the ReadDIBImage and WriteDIBImage in coders/dib.c
      allow attackers to cause an out of bounds write via a crafted file.

debian/experimental 2018-07-02 16:26:03 UTC 2018-07-02
Import patches-unapplied version 8:6.9.10.2+dfsg-1 to debian/experimental

Author: Bastien Roucariès
Author Date: 2018-06-25 12:29:02 UTC

Import patches-unapplied version 8:6.9.10.2+dfsg-1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: a99f4ddc1f3583f6389e753924bc7c7267e9fec8

New changelog entries:
  * Bug fix: "FTBFS on i386: testsuite failure in Magick++/tests/tests.tap
    2", thanks to Sven Joachim (Closes: #893953).
  * Bug fix: "drop libtool-bin from Build-Depends", thanks to Helmut
    Grohne (Closes: #893925).
  * Move to git dpm
  * Move to salsa
  * SO dump
  * Fix security bugs:
    + CVE-2018-9133: Excessive iteration in the DecodeLabImage
      and EncodeLabImage functions (coders/tiff.c), which results
      in a hang (tens of minutes) with a tiny PoC file.
      Remote attackers could leverage this vulnerability
      to cause a denial of service via a crafted tiff file.
      (Closes: #894848)
    + CVE-2018-9133: SetGrayscaleImage in the quantize.c file
      allows attackers to cause a heap-based buffer over-read
      via a crafted file.
    + CVE-2018-11624: the ReadMATImage function in coders/mat.c
      allows attackers to cause a use after free via a crafted file.
    + CVE-2018-11625: the SetGrayscaleImage in the quantize.c
      file allows attackers to cause a heap-based buffer over-read
      via a crafted file.
    + CVE-2018-10177: An infinite loop is present in the
      ReadOneMNGImage function of the coders/png.c file.
      Remote attackers could leverage this vulnerability
      to cause a denial of service via a crafted mng file.
    + CVE-2017-14528: Tested (with and without valgrind) and found immune.
      The TIFFSetProfiles function in coders/tiff.c has incorrect
      expectations about whether LibTIFF TIFFGetField return values
      imply that data validation has occurred, which allows remote attackers
      to cause a denial of service (use-after-free after an invalid call
      to TIFFSetField, and application crash) via a crafted file.
    + CVE-2018-11624: heap-based buffer over-read in IsWEBPImageLossless
      in coders/webp.c.
    + CVE-2018-10805: a memory leak in ReadYCBCRImage in coders/ycbcr.c.
      (Closes: #898218).
    + CVE-2018-10804: a memory leak in WriteTIFFImage in coders/tiff.c.
      (Closes: #898217)
    + CVE-2018-12599: the ReadBMPImage and WriteBMPImage functions
      in coders/bmp.c allow attackers to cause an out of bounds write
      via a crafted file.
    + CVE-2018-12600: the ReadDIBImage and WriteDIBImage in coders/dib.c
      allow attackers to cause an out of bounds write via a crafted file.

applied/debian/jessie 2018-06-23 17:14:33 UTC 2018-06-23
Import patches-applied version 8:6.8.9.9-5+deb8u12 to applied/debian/jessie

Author: Markus Koschany
Author Date: 2018-05-06 16:28:48 UTC

Import patches-applied version 8:6.8.9.9-5+deb8u12 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 0787bb47d236be615025f54f0ce26b04f8c10045
Unapplied parent: f9185dbda8a23d9818fbf529e4960396997a851d

New changelog entries:
  * Non-maintainer upload.
  * Fix the following security vulnerabilities:
    - CVE-2017-10995: heap-based buffer over-read and application crash via a
      crafted MNG image. (Closes: #867748)
    - CVE-2017-11533: heap-based buffer over-read in the WriteUILImage()
      function in coders/uil.c. (Closes: #869834)
    - CVE-2017-11535: heap-based buffer over-read in the WritePSImage()
      function in coders/ps.c. (Closes: #869827)
    - CVE-2017-11639: heap-based buffer over-read in the WriteCIPImage()
      function in coders/cip.c. (Closes: #870065)
    - CVE-2017-13143: ReadMATImage function in coders/mat.c uses uninitialized
      data, which might allow remote attackers to obtain sensitive information
      from process memory. (Closes: #870012)
    - CVE-2017-17504: heap-based buffer over-read. (Closes: #885340)
    - CVE-2017-17879: heap-based buffer over-read in ReadOneMNGImage
      in coders/png.c. (Closes: #885125)
    - CVE-2018-5248: heap-based buffer over-read in coders/sixel.c
      in the ReadSIXELImage function. (Closes: #886588)

debian/jessie 2018-06-23 17:14:33 UTC 2018-06-23
Import patches-unapplied version 8:6.8.9.9-5+deb8u12 to debian/jessie

Author: Markus Koschany
Author Date: 2018-05-06 16:28:48 UTC

Import patches-unapplied version 8:6.8.9.9-5+deb8u12 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: f2e8cc81d8b11e29fcff05309d83b05a14c69d0c

New changelog entries:
  * Non-maintainer upload.
  * Fix the following security vulnerabilities:
    - CVE-2017-10995: heap-based buffer over-read and application crash via a
      crafted MNG image. (Closes: #867748)
    - CVE-2017-11533: heap-based buffer over-read in the WriteUILImage()
      function in coders/uil.c. (Closes: #869834)
    - CVE-2017-11535: heap-based buffer over-read in the WritePSImage()
      function in coders/ps.c. (Closes: #869827)
    - CVE-2017-11639: heap-based buffer over-read in the WriteCIPImage()
      function in coders/cip.c. (Closes: #870065)
    - CVE-2017-13143: ReadMATImage function in coders/mat.c uses uninitialized
      data, which might allow remote attackers to obtain sensitive information
      from process memory. (Closes: #870012)
    - CVE-2017-17504: heap-based buffer over-read. (Closes: #885340)
    - CVE-2017-17879: heap-based buffer over-read in ReadOneMNGImage
      in coders/png.c. (Closes: #885125)
    - CVE-2018-5248: heap-based buffer over-read in coders/sixel.c
      in the ReadSIXELImage function. (Closes: #886588)

ubuntu/bionic-proposed 2018-04-06 14:09:39 UTC 2018-04-06
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6 to ubuntu/bionic-pr...

Author: Jeremy Bicha
Author Date: 2018-04-06 13:20:04 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: c64faf52cdf947d5c293a479f9383b09f4be6c4f

New changelog entries:
  * Stop installing the Debian-specific .desktop for the display program.
    (LP: #1740741, LP: #1740743, LP: #1717951, LP: #1615435,
    Closes: #675617, #677318)

ubuntu/bionic 2018-04-06 14:09:39 UTC 2018-04-06
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6 to ubuntu/bionic-pr...

Author: Jeremy Bicha
Author Date: 2018-04-06 13:20:04 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu6 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: c64faf52cdf947d5c293a479f9383b09f4be6c4f

New changelog entries:
  * Stop installing the Debian-specific .desktop for the display program.
    (LP: #1740741, LP: #1740743, LP: #1717951, LP: #1615435,
    Closes: #675617, #677318)

importer/debian/pristine-tar 2018-03-20 16:47:16 UTC 2018-03-20
pristine-tar data for imagemagick_6.9.9.39+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-20 16:47:16 UTC

pristine-tar data for imagemagick_6.9.9.39+dfsg.orig.tar.xz

importer/ubuntu/pristine-tar 2018-03-14 19:07:53 UTC 2018-03-14
pristine-tar data for imagemagick_6.9.7.4+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-14 19:07:53 UTC

pristine-tar data for imagemagick_6.9.7.4+dfsg.orig.tar.xz

ubuntu/artful 2017-08-07 15:43:25 UTC 2017-08-07
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2 to ubuntu/artful-pr...

Author: Matthias Klose
Author Date: 2017-08-07 15:21:52 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 83c7c22767916b07f104640772523127fd5bcd96

New changelog entries:
  * No-change rebuild for GCC 7 abi mangling change.

ubuntu/artful-proposed 2017-08-07 15:43:25 UTC 2017-08-07
Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2 to ubuntu/artful-pr...

Author: Matthias Klose
Author Date: 2017-08-07 15:21:52 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-16ubuntu2 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 83c7c22767916b07f104640772523127fd5bcd96

New changelog entries:
  * No-change rebuild for GCC 7 abi mangling change.

ubuntu/zesty-updates 2017-07-24 16:43:44 UTC 2017-07-24
Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-07-21 12:30:46 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: fe6ed611728e7debcf1ef69cdcbc65ee3ffc65f0

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.9.7.4+dfsg-12 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-9261, CVE-2017-9262, CVE-2017-9405, CVE-2017-9407,
      CVE-2017-9409, CVE-2017-9439, CVE-2017-9440, CVE-2017-9501,
      CVE-2017-10928, CVE-2017-11141, CVE-2017-11170, CVE-2017-11188,
      CVE-2017-11352, CVE-2017-11360, CVE-2017-11447, CVE-2017-11448,
      CVE-2017-11449, CVE-2017-11450, CVE-2017-11478

ubuntu/zesty-devel 2017-07-24 16:43:44 UTC 2017-07-24
Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-07-21 12:30:46 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: fe6ed611728e7debcf1ef69cdcbc65ee3ffc65f0

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.9.7.4+dfsg-12 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-9261, CVE-2017-9262, CVE-2017-9405, CVE-2017-9407,
      CVE-2017-9409, CVE-2017-9439, CVE-2017-9440, CVE-2017-9501,
      CVE-2017-10928, CVE-2017-11141, CVE-2017-11170, CVE-2017-11188,
      CVE-2017-11352, CVE-2017-11360, CVE-2017-11447, CVE-2017-11448,
      CVE-2017-11449, CVE-2017-11450, CVE-2017-11478

ubuntu/zesty-security 2017-07-24 16:43:44 UTC 2017-07-24
Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-se...

Author: Marc Deslauriers
Author Date: 2017-07-21 12:30:46 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1.2 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: fe6ed611728e7debcf1ef69cdcbc65ee3ffc65f0

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.9.7.4+dfsg-12 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-9261, CVE-2017-9262, CVE-2017-9405, CVE-2017-9407,
      CVE-2017-9409, CVE-2017-9439, CVE-2017-9440, CVE-2017-9501,
      CVE-2017-10928, CVE-2017-11141, CVE-2017-11170, CVE-2017-11188,
      CVE-2017-11352, CVE-2017-11360, CVE-2017-11447, CVE-2017-11448,
      CVE-2017-11449, CVE-2017-11450, CVE-2017-11478

ubuntu/yakkety-devel 2017-05-30 13:19:03 UTC 2017-05-30
Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-26 11:47:08 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f09bf0704d679219e4961c28b6ce57c73c7f4c9d

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u9 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-7606, CVE-2017-7619, CVE-2017-7941, CVE-2017-7943,
      CVE-2017-8343, CVE-2017-8344, CVE-2017-8345, CVE-2017-8346,
      CVE-2017-8347, CVE-2017-8348, CVE-2017-8349, CVE-2017-8350,
      CVE-2017-8351, CVE-2017-8352, CVE-2017-8353, CVE-2017-8354,
      CVE-2017-8355, CVE-2017-8356, CVE-2017-8357, CVE-2017-8765,
      CVE-2017-8830, CVE-2017-9098, CVE-2017-9141, CVE-2017-9142,
      CVE-2017-9143, CVE-2017-9144

ubuntu/yakkety-security 2017-05-30 13:19:03 UTC 2017-05-30
Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-26 11:47:08 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f09bf0704d679219e4961c28b6ce57c73c7f4c9d

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u9 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-7606, CVE-2017-7619, CVE-2017-7941, CVE-2017-7943,
      CVE-2017-8343, CVE-2017-8344, CVE-2017-8345, CVE-2017-8346,
      CVE-2017-8347, CVE-2017-8348, CVE-2017-8349, CVE-2017-8350,
      CVE-2017-8351, CVE-2017-8352, CVE-2017-8353, CVE-2017-8354,
      CVE-2017-8355, CVE-2017-8356, CVE-2017-8357, CVE-2017-8765,
      CVE-2017-8830, CVE-2017-9098, CVE-2017-9141, CVE-2017-9142,
      CVE-2017-9143, CVE-2017-9144

ubuntu/yakkety-updates 2017-05-30 13:19:03 UTC 2017-05-30
Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-05-26 11:47:08 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu8.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: f09bf0704d679219e4961c28b6ce57c73c7f4c9d

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u9 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-7606, CVE-2017-7619, CVE-2017-7941, CVE-2017-7943,
      CVE-2017-8343, CVE-2017-8344, CVE-2017-8345, CVE-2017-8346,
      CVE-2017-8347, CVE-2017-8348, CVE-2017-8349, CVE-2017-8350,
      CVE-2017-8351, CVE-2017-8352, CVE-2017-8353, CVE-2017-8354,
      CVE-2017-8355, CVE-2017-8356, CVE-2017-8357, CVE-2017-8765,
      CVE-2017-8830, CVE-2017-9098, CVE-2017-9141, CVE-2017-9142,
      CVE-2017-9143, CVE-2017-9144

ubuntu/zesty 2017-04-08 00:48:14 UTC 2017-04-08
Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1 to ubuntu/zesty-prop...

Author: Gianfranco Costamagna
Author Date: 2017-04-07 21:25:27 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 53ebbe1e9a15245e29d43a5c1d8bee9ae9245784

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Drop dependency on libopenjp2-7-dev, which is needed for JPEG2000
      but is not in main (LP: #711061).
      + Regenerate d/control file with `debian/rules update_pkg`
    - demote libmagickcore-6.q16hdri-3-extra and libmagickcore-6.q16-3-extra
      Recommends on libjxr-tools to Suggests, as it is in universe.

ubuntu/zesty-proposed 2017-04-08 00:48:14 UTC 2017-04-08
Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1 to ubuntu/zesty-prop...

Author: Gianfranco Costamagna
Author Date: 2017-04-07 21:25:27 UTC

Import patches-unapplied version 8:6.9.7.4+dfsg-3ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 53ebbe1e9a15245e29d43a5c1d8bee9ae9245784

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    - Drop dependency on libopenjp2-7-dev, which is needed for JPEG2000
      but is not in main (LP: #711061).
      + Regenerate d/control file with `debian/rules update_pkg`
    - demote libmagickcore-6.q16hdri-3-extra and libmagickcore-6.q16-3-extra
      Recommends on libjxr-tools to Suggests, as it is in universe.

ubuntu/precise-security 2017-03-14 17:18:27 UTC 2017-03-14
Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2017-03-14 13:55:55 UTC

Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 20bab6dbed7befb61dd7c75736d76f35d1964657

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u8 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-6498, CVE-2017-6500

ubuntu/precise-updates 2017-03-14 17:18:27 UTC 2017-03-14
Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2017-03-14 13:55:55 UTC

Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 20bab6dbed7befb61dd7c75736d76f35d1964657

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u8 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-6498, CVE-2017-6500

ubuntu/precise-devel 2017-03-14 17:18:27 UTC 2017-03-14
Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2017-03-14 13:55:55 UTC

Import patches-unapplied version 8:6.6.9.7-5ubuntu3.9 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 20bab6dbed7befb61dd7c75736d76f35d1964657

New changelog entries:
  * SECURITY UPDATE: multiple security issues
    - debian/patches/*: synchronize security fixes with Debian's
      8:6.8.9.9-5+deb8u8 release. Once again, thanks to Bastien Roucariès
      for the excellent work this update is based on!
    - CVE-2017-6498, CVE-2017-6500

ubuntu/yakkety-proposed 2016-08-15 23:45:37 UTC 2016-08-15
Import patches-unapplied version 8:6.8.9.9-7ubuntu8 to ubuntu/yakkety-proposed

Author: Jeremy Bicha
Author Date: 2016-08-12 21:18:29 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu8 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: bb8bdce770d50532ab32be0e1d070ee97cfc9d2a

New changelog entries:
  * Drop useless dependency on jasper. Closes # 818203. (LP: #1612822)

ubuntu/yakkety 2016-08-15 23:45:37 UTC 2016-08-15
Import patches-unapplied version 8:6.8.9.9-7ubuntu8 to ubuntu/yakkety-proposed

Author: Jeremy Bicha
Author Date: 2016-08-12 21:18:29 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu8 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: bb8bdce770d50532ab32be0e1d070ee97cfc9d2a

New changelog entries:
  * Drop useless dependency on jasper. Closes # 818203. (LP: #1612822)

debian/wheezy 2016-06-05 05:18:00 UTC 2016-06-05
Import patches-unapplied version 8:6.7.7.10-5+deb7u4 to debian/wheezy

Author: Brian May
Author Date: 2016-03-06 04:43:39 UTC

Import patches-unapplied version 8:6.7.7.10-5+deb7u4 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 38885caef1665e6adb1eb5b291bab768452cb9cd

New changelog entries:
  * Null pointer access in magick/constitute.c (closes: #811308)
    https://github.com/ImageMagick/ImageMagick/pull/34
    0071-Prevent-null-pointer-access-in-magick-constitute.c.patch
  * IM 6.9.2 crash with some PNG (closes: #811308, LP: #1492881)
    http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=28466
    0072-Fixed-out-of-bounds-error-in-SpliceImage.patch
  * Add fix-overflow-in-icon-parsing.patch to fix an integer overflow
    that can lead to a buffer overrun in the icon parsing code.
  * Add fix-overflow-in-pict-parsing.patch to fix an integer overflow
    that can lead to a double free.

applied/debian/wheezy 2016-06-05 05:18:00 UTC 2016-06-05
Import patches-applied version 8:6.7.7.10-5+deb7u4 to applied/debian/wheezy

Author: Brian May
Author Date: 2016-03-06 04:43:39 UTC

Import patches-applied version 8:6.7.7.10-5+deb7u4 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: e67063f1b3cf84fd0a2ca929465b0feb3d334c2e
Unapplied parent: b375e145a8036b14a5fef16c4799cc98988b922e

New changelog entries:
  * Null pointer access in magick/constitute.c (closes: #811308)
    https://github.com/ImageMagick/ImageMagick/pull/34
    0071-Prevent-null-pointer-access-in-magick-constitute.c.patch
  * IM 6.9.2 crash with some PNG (closes: #811308, LP: #1492881)
    http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=28466
    0072-Fixed-out-of-bounds-error-in-SpliceImage.patch
  * Add fix-overflow-in-icon-parsing.patch to fix an integer overflow
    that can lead to a buffer overrun in the icon parsing code.
  * Add fix-overflow-in-pict-parsing.patch to fix an integer overflow
    that can lead to a double free.

ubuntu/wily-security 2016-06-02 12:53:54 UTC 2016-06-02
Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-01 17:09:08 UTC

Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 81b250af5897c89c1d8810ae1f6985bd06a915c6

New changelog entries:
  * SECURITY UPDATE: ImageTragick remote code execution
    - d/p/0076-Disable-EPHEMERAL-URL-HTTPS-MVG-MSL-TEXT-SHOW-WIN-and-PLT-coders.patch
    - d/p/0077-Remove-PLT-Gnuplot-decoder.patch
    - d/p/0078-Sanitize-input-filename-for-http-and-https-delegates.patch
    - d/p/0079-Indirect-filename-must-be-authorized-by-policy.patch
    - d/p/0080-Prevent-indirect-reads-with-label-at.patch
    - d/p/0081-Less-secure-coders-require-explicit-reference.patch
    - debian/rules: build with --with-rsvg.
    - CVE-2016-3714
    - CVE-2016-3715
    - CVE-2016-3716
    - CVE-2016-3717
    - CVE-2016-3718
  * SECURITY UPDATE: popen() shell vulnerability
    - d/p/0082-Disable-MAGICKCORE_HAVE_POPEN.patch
    - CVE-2016-5118

ubuntu/wily-updates 2016-06-02 12:53:54 UTC 2016-06-02
Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-01 17:09:08 UTC

Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 81b250af5897c89c1d8810ae1f6985bd06a915c6

New changelog entries:
  * SECURITY UPDATE: ImageTragick remote code execution
    - d/p/0076-Disable-EPHEMERAL-URL-HTTPS-MVG-MSL-TEXT-SHOW-WIN-and-PLT-coders.patch
    - d/p/0077-Remove-PLT-Gnuplot-decoder.patch
    - d/p/0078-Sanitize-input-filename-for-http-and-https-delegates.patch
    - d/p/0079-Indirect-filename-must-be-authorized-by-policy.patch
    - d/p/0080-Prevent-indirect-reads-with-label-at.patch
    - d/p/0081-Less-secure-coders-require-explicit-reference.patch
    - debian/rules: build with --with-rsvg.
    - CVE-2016-3714
    - CVE-2016-3715
    - CVE-2016-3716
    - CVE-2016-3717
    - CVE-2016-3718
  * SECURITY UPDATE: popen() shell vulnerability
    - d/p/0082-Disable-MAGICKCORE_HAVE_POPEN.patch
    - CVE-2016-5118

ubuntu/wily-devel 2016-06-02 12:53:54 UTC 2016-06-02
Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-01 17:09:08 UTC

Import patches-unapplied version 8:6.8.9.9-5ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 81b250af5897c89c1d8810ae1f6985bd06a915c6

New changelog entries:
  * SECURITY UPDATE: ImageTragick remote code execution
    - d/p/0076-Disable-EPHEMERAL-URL-HTTPS-MVG-MSL-TEXT-SHOW-WIN-and-PLT-coders.patch
    - d/p/0077-Remove-PLT-Gnuplot-decoder.patch
    - d/p/0078-Sanitize-input-filename-for-http-and-https-delegates.patch
    - d/p/0079-Indirect-filename-must-be-authorized-by-policy.patch
    - d/p/0080-Prevent-indirect-reads-with-label-at.patch
    - d/p/0081-Less-secure-coders-require-explicit-reference.patch
    - debian/rules: build with --with-rsvg.
    - CVE-2016-3714
    - CVE-2016-3715
    - CVE-2016-3716
    - CVE-2016-3717
    - CVE-2016-3718
  * SECURITY UPDATE: popen() shell vulnerability
    - d/p/0082-Disable-MAGICKCORE_HAVE_POPEN.patch
    - CVE-2016-5118

ubuntu/xenial 2016-04-18 13:00:06 UTC 2016-04-18
Import patches-unapplied version 8:6.8.9.9-7ubuntu5 to ubuntu/xenial-proposed

Author: Iain Lane
Author Date: 2016-04-18 12:29:50 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu5 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: a14cb59bc05f5eb19307bb562bfebc14b4e042b3

New changelog entries:
  * debian/rules: Use LCQUANTUMDEPTH when generating display-im6.desktop too.
    Fixes broken icon in .desktop file. (LP: #1558409)

ubuntu/xenial-proposed 2016-04-18 13:00:06 UTC 2016-04-18
Import patches-unapplied version 8:6.8.9.9-7ubuntu5 to ubuntu/xenial-proposed

Author: Iain Lane
Author Date: 2016-04-18 12:29:50 UTC

Import patches-unapplied version 8:6.8.9.9-7ubuntu5 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: a14cb59bc05f5eb19307bb562bfebc14b4e042b3

New changelog entries:
  * debian/rules: Use LCQUANTUMDEPTH when generating display-im6.desktop too.
    Fixes broken icon in .desktop file. (LP: #1558409)

ubuntu/wily 2015-08-06 10:58:48 UTC 2015-08-06
Import patches-unapplied version 8:6.8.9.9-5ubuntu2 to ubuntu/wily-proposed

Author: Martin Pitt
Author Date: 2015-08-06 10:28:02 UTC

Import patches-unapplied version 8:6.8.9.9-5ubuntu2 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 0925bb34b6306f62609fc87335aaf824e5ba01d6

New changelog entries:
  * No-change rebuild against libopenexr22.

ubuntu/wily-proposed 2015-08-06 10:58:48 UTC 2015-08-06
Import patches-unapplied version 8:6.8.9.9-5ubuntu2 to ubuntu/wily-proposed

Author: Martin Pitt
Author Date: 2015-08-06 10:28:02 UTC

Import patches-unapplied version 8:6.8.9.9-5ubuntu2 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 0925bb34b6306f62609fc87335aaf824e5ba01d6

New changelog entries:
  * No-change rebuild against libopenexr22.

ubuntu/vivid 2015-01-06 04:13:50 UTC 2015-01-06
Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Author: Bastien Roucariès
Author Date: 2014-12-29 10:51:58 UTC

Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6499995b9926b619fd0da8ba823dcb04a6de7d33

New changelog entries:
  * Fix incorrect fix for xpm security problem.
    This patch fixed the buffer overflow but
    xpm coder output garbage, thanks to Adam Sjøgren
    (Closes: #773980).
  * Workarround "Imagemagick FTBFS on mips on mips-aql-* not on ball".
    Do not execute testsuite if FPU is not present. Security team
    want this bug fixed in order to ease it work, thanks
    to Ivo De Decker (Closes: #770009).

ubuntu/vivid-devel 2015-01-06 04:13:50 UTC 2015-01-06
Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Author: Bastien Roucariès
Author Date: 2014-12-29 10:51:58 UTC

Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6499995b9926b619fd0da8ba823dcb04a6de7d33

New changelog entries:
  * Fix incorrect fix for xpm security problem.
    This patch fixed the buffer overflow but
    xpm coder output garbage, thanks to Adam Sjøgren
    (Closes: #773980).
  * Workarround "Imagemagick FTBFS on mips on mips-aql-* not on ball".
    Do not execute testsuite if FPU is not present. Security team
    want this bug fixed in order to ease it work, thanks
    to Ivo De Decker (Closes: #770009).

ubuntu/vivid-proposed 2015-01-06 04:13:50 UTC 2015-01-06
Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Author: Bastien Roucariès
Author Date: 2014-12-29 10:51:58 UTC

Import patches-unapplied version 8:6.8.9.9-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6499995b9926b619fd0da8ba823dcb04a6de7d33

New changelog entries:
  * Fix incorrect fix for xpm security problem.
    This patch fixed the buffer overflow but
    xpm coder output garbage, thanks to Adam Sjøgren
    (Closes: #773980).
  * Workarround "Imagemagick FTBFS on mips on mips-aql-* not on ball".
    Do not execute testsuite if FPU is not present. Security team
    want this bug fixed in order to ease it work, thanks
    to Ivo De Decker (Closes: #770009).

ubuntu/utopic-proposed 2014-08-22 05:03:46 UTC 2014-08-22
Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-pr...

Author: Colin Watson
Author Date: 2014-08-21 13:22:23 UTC

Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 4aa19a6261d243ed1d85051c1b02b11f81f4b11a

New changelog entries:
  * Resynchronise with Debian. Remaining changes:
    - Make ufraw-batch (universe) a suggestion instead of a recommendation.
    - Depend on fftw3-dev as it's in main, not fftw-dev.
    - Make libmagickcore-dev depend on liblcms2-dev rather than liblcms-dev.
    - Build using dh-autoreconf.
    - Fix link of test cases.
  * Dropped changes:
    - Build-depend on libtiff5-dev instead of libtiff-dev (libtiff5-dev is
      the only libtiff-dev provider nowadays).
    - Configure with --disable-silent-rules (launchpad-buildd exports V=1
      for all builds now, which is equivalent).

ubuntu/utopic-devel 2014-08-22 05:03:46 UTC 2014-08-22
Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-pr...

Author: Colin Watson
Author Date: 2014-08-21 13:22:23 UTC

Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 4aa19a6261d243ed1d85051c1b02b11f81f4b11a

New changelog entries:
  * Resynchronise with Debian. Remaining changes:
    - Make ufraw-batch (universe) a suggestion instead of a recommendation.
    - Depend on fftw3-dev as it's in main, not fftw-dev.
    - Make libmagickcore-dev depend on liblcms2-dev rather than liblcms-dev.
    - Build using dh-autoreconf.
    - Fix link of test cases.
  * Dropped changes:
    - Build-depend on libtiff5-dev instead of libtiff-dev (libtiff5-dev is
      the only libtiff-dev provider nowadays).
    - Configure with --disable-silent-rules (launchpad-buildd exports V=1
      for all builds now, which is equivalent).

ubuntu/utopic 2014-08-22 05:03:46 UTC 2014-08-22
Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-pr...

Author: Colin Watson
Author Date: 2014-08-21 13:22:23 UTC

Import patches-unapplied version 8:6.7.7.10+dfsg-4ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: 4aa19a6261d243ed1d85051c1b02b11f81f4b11a

New changelog entries:
  * Resynchronise with Debian. Remaining changes:
    - Make ufraw-batch (universe) a suggestion instead of a recommendation.
    - Depend on fftw3-dev as it's in main, not fftw-dev.
    - Make libmagickcore-dev depend on liblcms2-dev rather than liblcms-dev.
    - Build using dh-autoreconf.
    - Fix link of test cases.
  * Dropped changes:
    - Build-depend on libtiff5-dev instead of libtiff-dev (libtiff5-dev is
      the only libtiff-dev provider nowadays).
    - Configure with --disable-silent-rules (launchpad-buildd exports V=1
      for all builds now, which is equivalent).

applied/debian/squeeze 2014-07-19 16:59:56 UTC 2014-07-19
Import patches-applied version 8:6.6.0.4-3+squeeze4 to applied/debian/squeeze

Author: Salvatore Bonaccorso
Author Date: 2014-03-18 19:54:04 UTC

Import patches-applied version 8:6.6.0.4-3+squeeze4 to applied/debian/squeeze

Imported using git-ubuntu import.

Changelog parent: d8fbb4ea22fc938f50bad3c3ca59de84468432a8
Unapplied parent: 50de2f1eaffbd970abd2a1a8ee1bd66590d59b50

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add 0006-CVE-2014-1947-Fix-buffer-overflow-when-handling-PSD-images.patch patch.
    CVE-2014-1947: Fix buffer overflow when handling PSD images.
    (Closes: #740250)
  * Add 0007-Prevent-buffer-overflow-in-messaging-system.patch patch.
    Add upstream patch to prevent buffer overflow in messaging system.

debian/squeeze 2014-07-19 16:59:56 UTC 2014-07-19
Import patches-unapplied version 8:6.6.0.4-3+squeeze4 to debian/squeeze

Author: Salvatore Bonaccorso
Author Date: 2014-03-18 19:54:04 UTC

Import patches-unapplied version 8:6.6.0.4-3+squeeze4 to debian/squeeze

Imported using git-ubuntu import.

Changelog parent: 9439f5e3bde0bf09aea7e02f133e1fba1267f1b1

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add 0006-CVE-2014-1947-Fix-buffer-overflow-when-handling-PSD-images.patch patch.
    CVE-2014-1947: Fix buffer overflow when handling PSD images.
    (Closes: #740250)
  * Add 0007-Prevent-buffer-overflow-in-messaging-system.patch patch.
    Add upstream patch to prevent buffer overflow in messaging system.

ubuntu/quantal-devel 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-secu...

Author: Marc Deslauriers
Author Date: 2014-03-06 16:20:37 UTC

Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 36c4abce5c75fb7b468dc44051b77b47119c5750

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/quantal-security 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-secu...

Author: Marc Deslauriers
Author Date: 2014-03-06 16:20:37 UTC

Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 36c4abce5c75fb7b468dc44051b77b47119c5750

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/quantal-updates 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-secu...

Author: Marc Deslauriers
Author Date: 2014-03-06 16:20:37 UTC

Import patches-unapplied version 8:6.7.7.10-2ubuntu4.2 to ubuntu/quantal-security

Imported using git-ubuntu import.

Changelog parent: 36c4abce5c75fb7b468dc44051b77b47119c5750

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/saucy-updates 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Author: Marc Deslauriers
Author Date: 2014-03-06 16:19:36 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: 83f5d4c4a247298aa944deb2ca92811eb9062703

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/saucy-security 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Author: Marc Deslauriers
Author Date: 2014-03-06 16:19:36 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: 83f5d4c4a247298aa944deb2ca92811eb9062703

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/saucy-devel 2014-03-06 19:38:14 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Author: Marc Deslauriers
Author Date: 2014-03-06 16:19:36 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu3.1 to ubuntu/saucy-security

Imported using git-ubuntu import.

Changelog parent: 83f5d4c4a247298aa944deb2ca92811eb9062703

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/trusty-proposed 2014-03-06 19:08:25 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-6ubuntu3 to ubuntu/trusty-proposed

Author: Marc Deslauriers
Author Date: 2014-03-06 16:12:57 UTC

Import patches-unapplied version 8:6.7.7.10-6ubuntu3 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 75f2af4d2c022bc283cdd1ff76a56ee062d6b6ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/trusty 2014-03-06 19:08:25 UTC 2014-03-06
Import patches-unapplied version 8:6.7.7.10-6ubuntu3 to ubuntu/trusty-proposed

Author: Marc Deslauriers
Author Date: 2014-03-06 16:12:57 UTC

Import patches-unapplied version 8:6.7.7.10-6ubuntu3 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 75f2af4d2c022bc283cdd1ff76a56ee062d6b6ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via psd
    images processing rle decoding buffer overflow
    - debian/patches/CVE-2014-1958.patch: check lengths in coders/psd.c.
    - CVE-2014-1958
  * SECURITY UPDATE: denial of service via jpeg images with specially-
    crafted restart markers
    - debian/patches/CVE-2014-2030.patch: don't overflow layer_name in
      coders/psd.c.
    - CVE-2014-2030

ubuntu/raring-security 2013-09-10 14:58:17 UTC 2013-09-10
Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-09 18:58:28 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 81b1ee2c92a566bfdaa9a021967f71cea18608ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution in GIF
    image comment decoding (LP: #1218248)
    - debian/patches/CVE-2013-4298.patch: properly handle comments in
      coders/gif.c.
    - CVE-2013-4298

ubuntu/raring-updates 2013-09-10 14:58:17 UTC 2013-09-10
Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-09 18:58:28 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 81b1ee2c92a566bfdaa9a021967f71cea18608ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution in GIF
    image comment decoding (LP: #1218248)
    - debian/patches/CVE-2013-4298.patch: properly handle comments in
      coders/gif.c.
    - CVE-2013-4298

ubuntu/raring-devel 2013-09-10 14:58:17 UTC 2013-09-10
Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Author: Marc Deslauriers
Author Date: 2013-09-09 18:58:28 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu2.1 to ubuntu/raring-security

Imported using git-ubuntu import.

Changelog parent: 81b1ee2c92a566bfdaa9a021967f71cea18608ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution in GIF
    image comment decoding (LP: #1218248)
    - debian/patches/CVE-2013-4298.patch: properly handle comments in
      coders/gif.c.
    - CVE-2013-4298

ubuntu/saucy-proposed 2013-09-10 13:23:21 UTC 2013-09-10
Import patches-unapplied version 8:6.7.7.10-5ubuntu3 to ubuntu/saucy-proposed

Author: Marc Deslauriers
Author Date: 2013-09-09 18:49:08 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu3 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 81b1ee2c92a566bfdaa9a021967f71cea18608ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution in GIF
    image comment decoding (LP: #1218248)
    - debian/patches/CVE-2013-4298.patch: properly handle comments in
      coders/gif.c.
    - CVE-2013-4298

ubuntu/saucy 2013-09-10 13:23:21 UTC 2013-09-10
Import patches-unapplied version 8:6.7.7.10-5ubuntu3 to ubuntu/saucy-proposed

Author: Marc Deslauriers
Author Date: 2013-09-09 18:49:08 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu3 to ubuntu/saucy-proposed

Imported using git-ubuntu import.

Changelog parent: 81b1ee2c92a566bfdaa9a021967f71cea18608ea

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution in GIF
    image comment decoding (LP: #1218248)
    - debian/patches/CVE-2013-4298.patch: properly handle comments in
      coders/gif.c.
    - CVE-2013-4298

ubuntu/raring-proposed 2013-02-25 20:03:22 UTC 2013-02-25
Import patches-unapplied version 8:6.7.7.10-5ubuntu2 to ubuntu/raring-proposed

Author: Philip Muškovac
Author Date: 2013-02-24 17:06:30 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu2 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: f6565cd078039c58563a30f51452c5e75af8287a

New changelog entries:
  * libmagickcore-dev should depend on liblcms2-dev not liblcms-dev
    (LP: #1132506)

ubuntu/raring 2013-02-25 20:03:22 UTC 2013-02-25
Import patches-unapplied version 8:6.7.7.10-5ubuntu2 to ubuntu/raring-proposed

Author: Philip Muškovac
Author Date: 2013-02-24 17:06:30 UTC

Import patches-unapplied version 8:6.7.7.10-5ubuntu2 to ubuntu/raring-proposed

Imported using git-ubuntu import.

Changelog parent: f6565cd078039c58563a30f51452c5e75af8287a

New changelog entries:
  * libmagickcore-dev should depend on liblcms2-dev not liblcms-dev
    (LP: #1132506)

ubuntu/natty-security 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:56:17 UTC

Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ac206647fa7804b6e2b0e1cc9c50f936fb51aab2

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/natty-updates 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:56:17 UTC

Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ac206647fa7804b6e2b0e1cc9c50f936fb51aab2

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/oneiric-devel 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:51:30 UTC

Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 891decd6e91c82cf0910a3a7c1013a3fab8d9a5a

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/oneiric-security 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:51:30 UTC

Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 891decd6e91c82cf0910a3a7c1013a3fab8d9a5a

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/oneiric-updates 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:51:30 UTC

Import patches-unapplied version 8:6.6.0.4-3ubuntu1.2 to ubuntu/oneiric-security

Imported using git-ubuntu import.

Changelog parent: 891decd6e91c82cf0910a3a7c1013a3fab8d9a5a

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/lucid-security 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:59:07 UTC

Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8da654ca159c7b5ec79542dd9023b01a7f5b293f

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/lucid-updates 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:59:07 UTC

Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8da654ca159c7b5ec79542dd9023b01a7f5b293f

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/lucid-devel 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:59:07 UTC

Import patches-unapplied version 7:6.5.7.8-1ubuntu1.3 to ubuntu/lucid-security

Imported using git-ubuntu import.

Changelog parent: 8da654ca159c7b5ec79542dd9023b01a7f5b293f

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/natty-devel 2012-08-22 15:03:15 UTC 2012-08-22
Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Author: Jamie Strandboge
Author Date: 2012-08-17 14:56:17 UTC

Import patches-unapplied version 7:6.6.2.6-1ubuntu4.2 to ubuntu/natty-security

Imported using git-ubuntu import.

Changelog parent: ac206647fa7804b6e2b0e1cc9c50f936fb51aab2

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/quantal 2012-08-17 17:33:40 UTC 2012-08-17
Import patches-unapplied version 8:6.7.7.10-2ubuntu4 to ubuntu/quantal

Author: Jamie Strandboge
Author Date: 2012-08-17 14:31:02 UTC

Import patches-unapplied version 8:6.7.7.10-2ubuntu4 to ubuntu/quantal

Imported using git-ubuntu import.

Changelog parent: 5d22b35752a7c9234b6896b3ddb55e665811ed52

New changelog entries:
  * SECURITY UPDATE: denial of service via large resource consumption
    - debian/patches/CVE-2012-3437.patch: always use correct size argument
      with libpng memory allocation
    - CVE-2012-3437

ubuntu/precise 2012-02-17 12:04:38 UTC 2012-02-17
Import patches-unapplied version 8:6.6.9.7-5ubuntu3 to ubuntu/precise

Author: Scott Howard
Author Date: 2012-02-17 10:39:05 UTC

Import patches-unapplied version 8:6.6.9.7-5ubuntu3 to ubuntu/precise

Imported using git-ubuntu import.

Changelog parent: aa2ca5f201c7626c5e4d63cb8e76695e347ab845

New changelog entries:
  * 0006-rsvg-convert.patch: upstream removed the rsvg command from
    librsvg2-bin, use rsvg-convert instead (LP: #929573)

ubuntu/oneiric 2011-06-15 11:05:05 UTC 2011-06-15
Import patches-unapplied version 8:6.6.0.4-3ubuntu1 to ubuntu/oneiric

Author: Colin Watson
Author Date: 2011-06-15 10:05:28 UTC

Import patches-unapplied version 8:6.6.0.4-3ubuntu1 to ubuntu/oneiric

Imported using git-ubuntu import.

Changelog parent: 9ebaa9739af1908a88d747d00a31ccb30a673c65

New changelog entries:
  * Resynchronise with Debian (LP: #797595). Remaining changes:
    - Make ufraw-batch (universe) a suggestion instead of a recommendation.
    - Make debian/rules install target depend on check; they cannot reliably
      be run in parallel.
    - Don't set MAKEFLAGS in debian/rules; just pass it to the build.

ubuntu/natty 2011-03-16 02:04:43 UTC 2011-03-16
Import patches-unapplied version 7:6.6.2.6-1ubuntu4 to ubuntu/natty

Author: Matthias Klose
Author Date: 2011-03-16 01:02:30 UTC

Import patches-unapplied version 7:6.6.2.6-1ubuntu4 to ubuntu/natty

Imported using git-ubuntu import.

Changelog parent: ae8f9c97eb367141df01f2c8efba2e49e06affee

New changelog entries:
  * Don't set MAKEFLAGS in debian/rules. just pass it to the build.

ubuntu/maverick-updates 2010-12-07 19:06:37 UTC 2010-12-07
Import patches-unapplied version 7:6.6.2.6-1ubuntu1.1 to ubuntu/maverick-secu...

Author: Marc Deslauriers
Author Date: 2010-12-02 14:29:34 UTC

Import patches-unapplied version 7:6.6.2.6-1ubuntu1.1 to ubuntu/maverick-security

Imported using git-ubuntu import.

Changelog parent: 7c9f455decfed6f16d4daa4e880937cc98b37f8f

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via config files in the
    current directory.
    - debian/patches/CVE-2010-4167.patch: don't read config files from
      the current directory for the "installed" version.
    - CVE-2010-4167

ubuntu/hardy-security 2010-12-07 19:06:37 UTC 2010-12-07
Import patches-unapplied version 7:6.3.7.9.dfsg1-2ubuntu1.2 to ubuntu/hardy-s...

Author: Marc Deslauriers
Author Date: 2010-12-02 20:08:44 UTC

Import patches-unapplied version 7:6.3.7.9.dfsg1-2ubuntu1.2 to ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 713b5d0f96cabf06669f97e440759ca02855b854

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via config files in the
    current directory.
    - debian/patches/CVE-2010-4167.patch: don't read config files from
      the current directory for the "installed" version.
    - CVE-2010-4167

ubuntu/hardy-devel 2010-12-07 19:06:37 UTC 2010-12-07
Import patches-unapplied version 7:6.3.7.9.dfsg1-2ubuntu1.2 to ubuntu/hardy-s...

Author: Marc Deslauriers
Author Date: 2010-12-02 20:08:44 UTC

Import patches-unapplied version 7:6.3.7.9.dfsg1-2ubuntu1.2 to ubuntu/hardy-security

Imported using git-ubuntu import.

Changelog parent: 713b5d0f96cabf06669f97e440759ca02855b854

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via config files in the
    current directory.
    - debian/patches/CVE-2010-4167.patch: don't read config files from
      the current directory for the "installed" version.
    - CVE-2010-4167

ubuntu/karmic-devel 2010-12-07 19:06:37 UTC 2010-12-07
Import patches-unapplied version 7:6.5.1.0-1.1ubuntu3.1 to ubuntu/karmic-secu...

Author: Marc Deslauriers
Author Date: 2010-12-02 15:13:42 UTC

Import patches-unapplied version 7:6.5.1.0-1.1ubuntu3.1 to ubuntu/karmic-security

Imported using git-ubuntu import.

Changelog parent: 09cdb1715f9ba82112015de8ad051be8d242e5c7

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via config files in the
    current directory.
    - debian/patches/CVE-2010-4167.patch: don't read config files from
      the current directory for the "installed" version.
    - CVE-2010-4167

ubuntu/karmic-security 2010-12-07 19:06:37 UTC 2010-12-07
Import patches-unapplied version 7:6.5.1.0-1.1ubuntu3.1 to ubuntu/karmic-secu...

Author: Marc Deslauriers
Author Date: 2010-12-02 15:13:42 UTC

Import patches-unapplied version 7:6.5.1.0-1.1ubuntu3.1 to ubuntu/karmic-security

Imported using git-ubuntu import.

Changelog parent: 09cdb1715f9ba82112015de8ad051be8d242e5c7

New changelog entries:
  * SECURITY UPDATE: arbitrary code execution via config files in the
    current directory.
    - debian/patches/CVE-2010-4167.patch: don't read config files from
      the current directory for the "installed" version.
    - CVE-2010-4167

1100 of 155 results

Other repositories

Name Last Modified
lp:~discoverygarden-inc/ubuntu/+source/imagemagick 2019-04-04
lp:ubuntu/+source/imagemagick 2019-01-11
lp:~nacc/ubuntu/+source/imagemagick 2016-11-23
13 of 3 results
You can't create new repositories for imagemagick in Ubuntu.