perl-PerlMagick-6.8.8.1-85.1<>,_%]Go/=„!bsr ,M<TL-sMX֭y5BQ:t0FORcR͏qZ3VDjAasz&P&/G2CXO5>Vdf2k2J)RՕB2Lt -"@\o<r+ᶛW/m]>rUwu).=!:`Eu$s7!m$29*9 ?]ZUA王TG4Ie>: L? <d  > 3<H a|.\. . . . .  . . .  . h  \(89:%sFG.H.I<.XlY\.]`.^d bcdef l"u4.vw`.x.yz ,Cperl-PerlMagick6.8.8.185.1Perl interface for ImageMagickPerlMagick is an objected-oriented Perl interface to ImageMagick. Use the module to read, manipulate, or write an image or image sequence from within a Perl script. This makes it suitable for Web CGI scripts.]Gobuild75 lPopenSUSE Leap 42.3openSUSEImageMagickhttp://bugs.opensuse.orgDevelopment/Libraries/Perlhttp://www.imagemagick.orglinuxx86_64kX@h@b[0H h|dO6f+ [\ LEU5 _ ]AA$$AA$mA$m$$A큤A큤큤큤큤큤큤$$]E]E]Eo]Eo]E]E]E]E]E]E]E]E]E]GmRQ:CRZcJvO0 JvJ[)JvOjnvJvO0 JvQP]JvRM,JvJvO0 Ojg]O0 LF)O0 JvO0 JvJvJvJvJvO0 ]E]E0419df9406d39801557a3a327ddc299221f5a2e2e1c93b5de3402e005350c055d41d8cd98f00b204e9800998ecf8427eabd25bdde06d21c44da09768c6a8a240d41d8cd98f00b204e9800998ecf8427e1571ee5a59790d826560f1fae773d43cd42eac4378e43693a52ea1a4d12e507442945b7885e4d88de21d315d4b173b735d84c6ddd4028aa53d028b4c50f9361ed7cb7f285b2bd26ad8d4b9760a6b137e1c28f465d9f1379f07437d9df543d422574b32f2aeede306c02911efa97afd09ff1dca707ae43fa69ec96967c010e2791b92421507bb71e1ae6c8cf8738482246aa74241e25acca11a1166f69447a3564a1e90ea4a2354ca61b4905051f849a4a557c66eb552d6844a4b4bd0f1d56f9d9e0669a38e2d9e3fcd402e0173236a9f0cdce10eee85fb6e0159765cf2004f72f008fe2cbc4750ce46f0ca2cca69cb76b8340443d80ba5bf907a632142d385d6eda12b8d032c0567bc186d543e1e0b0505bb60911608cf69fbfa83a0ebc80346add763831ccfaf097db2a0e918d7a9a875c496966d3230fa644ad0a186f3143ef703adf66592ebc7b8081ebb3c1549f473f7a973c19036a086ccdb356f28a03e32cfe6a32878de63180e90d7a1d0d5be49bb5d1531b5a58f263c7fae934b0d90d6067d8055c66658a9c7a1f99caa368722098a4cda92daf9330107566835231a4c1d9643ba8c7b49b35d6720bb222ed981af0b994482d02c634f174f3429f00cbea4fe2a52b0ddfc03f60cc2f3f5b10ac87cadddfb31049b12c594ad33361db0d45b32d787b6d74d0ce41d734d61d86911854e3ab362c32f60206cb181d00c389c394a29cbdf814188cd39112b3b8d7be2adee2aae8f6622748183d14de4fc80rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootImageMagick-6.8.8.1-85.1.src.rpmMagick.so()(64bit)Q16.so()(64bit)perl(Image::Magick)perl(Image::Magick::Q16)perl-PerlMagickperl-PerlMagick(x86-64)@@@@@@@@   /usr/bin/perlImageMagicklibMagickCore-6.Q16.so.1()(64bit)libMagickCore-6_Q16-1libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)perlrpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)6.8.8.16.8.8.15.18.23.0.4-14.0-14.4.6-14.11.2] #]@]@\\"\ޢ@\\@\8\\r@\\\eX@\ac\ac\ac\-@\&@[@[[ͻ[ͻ[ͻ[[;@[;@[;@[[@[[@[@[@[@[\[\[\[@["@["@[}P@[i[i[i[h8@[*A[#@["X[[W[W[@ZmZ@Z3@ZZЛZЛZZZ̧@Z̧@Za@ZZZZZ1@ZZZZZZZZ_@Z_@Z_@Z_@Z ZZZ$Z@Z@Z@Z@Z@ZZZ}@Zz@ZyZqZqZp^@Zp^@Zk@Zk@Zhu@Zhu@Zhu@Ze@Z\ZTZTZTZS]@ZOhZLZLZKt@Z2gZ1@Z/Z.s@Z.s@Z'Z&@Z&@Z&@Z&@Z%8Z%8Z!D@ZZ@ZOZ@Z@Z@Z@ZNZNZNZNYY@Y@Y@YeY|Y+@YYY@Yp@Yp@YqYS@Y-^Y"YtXXX~@Xk@XN@XD@X<@X.@X)@X#XW W.@Ws@WV@WM|W)@V@V$@VTd@TXTk@SSXRR=R=R@RRR@RM\@RL RL RJ@RIgRIgR(r@R@Q@Q@QQaQQa_QU@QNQ$QEQEQEQEPDP@P@P @P!@OOqOYO:LOOObNNj@NuN@Nx@NtNs:@Ng\N2M6@Mߒ@M@M۝Mc@MƅM@M@MdMbSMY@L@L LҠ@LB@L@L)@Ls@LV@LQm@L K@KՀ@KsK"@K!@Ky7@KqN@KKKD{@K y@J@JJx"Jq@J)pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comPetr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comrdodopoulos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comsflees@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comfcrozat@suse.compgajdos@suse.comdmueller@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comtom.mbrt@googlemail.compgajdos@suse.comdvaleev@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.comvjt@openssl.itvjt@openssl.itvjt@openssl.itvjt@openssl.itpgajdos@suse.commeissner@suse.commrdocs@opensuse.orgschuetzm@gmx.netpgajdos@suse.compgajdos@suse.compgajdos@suse.comgiecrilj@stegny.2a.plcfarrell@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comjengelh@medozas.dejengelh@medozas.depgajdos@suse.compgajdos@novell.compgajdos@novell.comcoolo@novell.comcoolo@novell.comdimstar@opensuse.orgpgajdos@suse.czgiecrilj@stegny.2a.plgiecrilj@stegny.2a.plpgajdos@suse.czpgajdos@suse.czjw@novell.compgajdos@suse.czcoolo@novell.compgajdos@suse.czpgajdos@suse.czpgajdos@novell.compgajdos@novell.compgajdos@suse.czpgajdos@suse.czcoolo@novell.compgajdos@suse.czpgajdos@suse.czaj@suse.depgajdos@suse.czro@suse.depgajdos@suse.czpgajdos@suse.czpgajdos@suse.czprusnak@suse.czpgajdos@suse.czjengelh@medozas.depgajdos@suse.czcoolo@novell.compgajdos@suse.czpgajdos@suse.czro@suse.denadvornik@suse.cz- security update - added patches CVE-2019-11597 [bsc#1138464] + ImageMagick-CVE-2019-11597.patch- security update - disable indirect reads [bsc#1138425] (https://imagemagick.org/script/security-policy.php) - modified patches % ImageMagick-configuration-SUSE.patch (refreshed)- security update * really fix CVE-2019-11470 [bsc#1133205] - modified patches % ImageMagick-CVE-2019-11470.patch (refreshed)- security update - added patches CVE-2019-11598 [bsc#1136732] + ImageMagick-CVE-2019-11598.patch- disable also PCL [bsc#1136183] - modified patches % ImageMagick-configuration-SUSE.patch- security update - added patches CVE-2017-12805 [bsc#1135236] + ImageMagick-CVE-2017-12805.patch- ImageMagick-meta.c-update.patch also fixes CVE-2019-10131 [bsc#1134075], CVE-2017-12806 [bsc#1135232]- security update - modified patches CVE-2019-11008 [bsc#1132054], CVE-2019-11009 [bsc#1132053], CVE-2019-11472 [bsc#1133204] % ImageMagick-xwd.c-update.patch (extended) - added patches CVE-2019-11470 [bsc#1133205] + ImageMagick-CVE-2019-11470.patch CVE-2019-11506 [bsc#1133498] + ImageMagick-CVE-2019-11506.patch CVE-2019-11505 [bsc#1133501] + ImageMagick-CVE-2019-11505.patch- provide two new packages with configuration [bsc#1122033]: * ImageMagick-config-upstream - provides configuration provided by upstream (no restrictions) * ImageMagick-config-SUSE (preferred) - provides configuration provided by SUSE (with security restrictions) and use update-alternatives for selecting configurations. - deleted patches - ImageMagick-6.8.8-1-disable-insecure-coders.patch (renamed) - added patches + ImageMagick-configuration-SUSE.patch- security update - added patches CVE-2019-11007 [bsc#1132060] + ImageMagick-CVE-2019-11007.patch CVE-2019-11008 [bsc#1132054], CVE-2019-11009 [bsc#1132053] + ImageMagick-xwd.c-update.patch- security update - added patches CVE-2019-10650 [bsc#1131317] + ImageMagick-CVE-2019-10650.patch CVE-2019-9956 [bsc#1130330] + ImageMagick-CVE-2019-9956.patch- security update - added patches CVE-2019-7175 [bsc#1128649] + ImageMagick-CVE-2019-7175.patch- fix regression in dcm coder [bsc#1107609#c36] % ImageMagick-CVE-2018-16644.patch- security update (pdf.c): * CVE-2019-7397 [bsc#1124366] + ImageMagick-CVE-2019-7397.patch- security update (psd.c): * CVE-2019-7395 [bsc#1124368] + ImageMagick-CVE-2019-7395.patch- security update (dib.c) * CVE-2019-7398 [bsc#1124365] + ImageMagick-CVE-2019-7398.patch- security update (bmp.c): * CVE-2018-20467 [bsc#1120381] + ImageMagick-CVE-2018-20467.patch- allow override system security policy [bsc#1117463]- improve import documentation [bsc#1057246]- security update (msl.c): * CVE-2018-18544 [bsc#1113064] + ImageMagick-CVE-2018-18544.patch- security update (pict.c): * CVE-2017-14997 [bsc#1112399] + ImageMagick-CVE-2017-14997.patch- fix regression in pict coder [bsc#1107609#c24] % ImageMagick-CVE-2018-16644.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- security update (bmp.c) * CVE-2018-18024 [bsc#1111069] * ImageMagick-CVE-2018-18024.patch- security update (pcx.c) * CVE-2018-18016 [bsc#1111072] % ImageMagick-CVE-2017-13058.patch renamed to ImageMagick-CVE-2017-13058,CVE-2018-18016.patch- security update (sgi.c) * CVE-2018-17965 [bsc#1110747] + ImageMagick-CVE-2018-17965.patch- security update (dib.c and bmp.c) * CVE-2018-12600 [bsc#1098545] + ImageMagick-CVE-2018-12600.patch * CVE-2018-12599 [bsc#1098546] + ImageMagick-CVE-2018-12599.patch- security update (pdb.c): * CVE-2018-17966 [bsc#1110746] + ImageMagick-CVE-2018-17966.patch- allow writing PS, PS2, PS3, XPS, EPS and PDF, disable reading only by default security policy [bsc#1105592c#32]- security update (core, cache) * CVE-2017-11532 [bsc#1050129] + ImageMagick-CVE-2017-11532.patch- security update (meta.c): * CVE-2018-16750 [bsc#1108283] + ImageMagick-meta.c-update.patch- security update (png.c): * CVE-2018-16749 [bsc#1108282] + ImageMagick-CVE-2018-16749.patch- security update (cut.c): * CVE-2018-16642 [bsc#1107616] + ImageMagick-CVE-2018-16642.patch- security update (png.c): * CVE-2018-16640 [bsc#1107619] + ImageMagick-CVE-2018-16640.patch- security update (cals.c, dcm.c, pict.c, pwp.c): * CVE-2018-16643 [bsc#1107612] + ImageMagick-CVE-2018-16643.patch- security update (pict.c): * CVE-2018-16644 [bsc#1107609] + ImageMagick-CVE-2018-16644.patch- security update (bmp.c, dib.c): * CVE-2018-16645 [bsc#1107604] + ImageMagick-CVE-2018-16645.patch- security update (psd.c) * CVE-2018-16413 [bsc#1106989], CVE-2018-16412 [bsc#1106996] + ImageMagick-CVE-2018-16412,16413.patch (formerly ImageMagick-CVE-2018-16413.patch)- security update (core) * CVE-2018-16329 [bsc#1106858] + ImageMagick-CVE-2018-16329.patch- security update (xbm.c) * CVE-2018-16323 [bsc#1106855] + ImageMagick-CVE-2018-16323.patch- disable PS, PS2, PS3, XPS and PDF coders in default policy.xml [bsc#1105592]- security update (pcd.c): * CVE-2018-14435 [bsc#1102007] + ImageMagick-CVE-2018-14435.patch- security update (miff.c): * CVE-2018-14436 [bsc#1102005] + ImageMagick-CVE-2018-14436.patch- security update (meta.c): * CVE-2018-14437 [bsc#1102004] + ImageMagick-CVE-2018-14437.patch- security update (mpc.c): * CVE-2018-14434 [bsc#1102003] + ImageMagick-CVE-2018-14434.patch- security update (bgr.c, rgb.c, cmyk.c, gray.c, ycbcr.c) * CVE-2018-10805 and similar memory leaks [bsc#1095812] + ImageMagick-CVE-2018-10805.patch- security update (core) * CVE-2018-11655 [bnc#1095730] + ImageMagick-CVE-2018-11655.patch- security udpate (tiff.c) * CVE-2018-10804 [bsc#1095813] + ImageMagick-CVE-2018-10804.patch- security update (core) * CVE-2017-13758 [bsc#1056277] + ImageMagick-CVE-2017-13758.patch * fixed hang [bsc#1056277] . ImageMagick-CVE-2017-10928.patch- security update (sun.c) * CVE-2018-11251 [bsc#1094237] + ImageMagick-CVE-2018-11251.patch- security update (miff.c) * CVE-2017-18271 [bsc#1094204] + ImageMagick-CVE-2017-18271.patch- security update (tiff.c): * CVE-2018-9133 [bsc#1087820] + ImageMagick-CVE-2018-9133.patch- security update (core) * CVE-2017-17887 [bsc#1074117] + ImageMagick-CVE-2017-17887.patch- security update (png.c) * CVE-2018-10177 [bsc#1089781] + ImageMagick-CVE-2018-10177.patch- security update (tiff.c) * CVE-2018-8960 [bsc#1086782] + ImageMagick-CVE-2018-8960.patch- security update (core) * CVE-2017-14325 [bsc#1058635] + ImageMagick-CVE-2017-14325.patch- security update (png.c) * CVE-2018-9018 [bsc#1086773] + ImageMagick-CVE-2018-9018.patch- security update (wand) * CVE-2017-18252 [bsc#1087033] + ImageMagick-CVE-2017-18252.patch- security update (webp.c) * CVE-2018-9135 [bsc#1087825] + ImageMagick-CVE-2018-9135.patch- security update (core) * CVE-2017-18250 [bsc#1087039] + ImageMagick-CVE-2017-18254.patch- security update (gif.c) * CVE-2017-18254 [bsc#1087027] + ImageMagick-CVE-2017-18254.patch- security update (core) * CVE-2017-10928 [bsc#1047356] + ImageMagick-CVE-2017-18251.patch- security update (pcd.c) * CVE-2017-18251 [bsc#1087037] + ImageMagick-CVE-2017-18251.patch - fixed patches (thanks to patch-2.7.6): . ImageMagick-CVE-2017-1000476.patch . ImageMagick-CVE-2017-11450.patch- security update (ept.c) * CVE-2018-8804 [bsc#1086011] + ImageMagick-CVE-2018-8804.patch- security update (core) * CVE-2017-11524 [bsc#1050087] + ImageMagick-CVE-2017-11524.patch- security update (core) * CVE-2017-18209 [bsc#1083628] + ImageMagick-CVE-2017-18209.patch * CVE-2017-18211 [bsc#1083634] + ImageMagick-CVE-2017-18211.patch- security update (miff.c) * CVE-2017-9500 [bsc#1043290] + ImageMagick-CVE-2017-9500.patch- security update (core) * CVE-2017-14739 [bsc#1060382] + ImageMagick-CVE-2017-14739.patch- security update (core) * CVE-2017-16353 [bsc#1066170] + ImageMagick-CVE-2017-16353.patch * CVE-2017-16352 [bsc#1066168] + ImageMagick-CVE-2017-16352.patch * CVE-2017-14314 [bsc#1058630] + ImageMagick-CVE-2017-14314.patch * CVE-2017-13768 [bsc#1056434] + ImageMagick-CVE-2017-13768.patch * CVE-2017-14505 [bsc#1059735] + ImageMagick-CVE-2017-14505.patch- security update (webp.c): * CVE-2018-7470 [bsc#1082837] + ImageMagick-CVE-2018-7470.patch- security update (tiff.c): * CVE-2018-7443 [bsc#1082792] + ImageMagick-CVE-2018-7443.patch- security update (emf.c): * CVE-2017-15016 [bsc#1082291] + ImageMagick-CVE-2017-15016.patch- security update (png.c): * CVE-2017-15017 [bsc#1082283] + ImageMagick-CVE-2017-15017.patch- security update (viff.c): * CVE-2017-12692 [bsc#1082362] + ImageMagick-CVE-2017-12692.patch- security update (bmp.c): * CVE-2017-12693 [bsc#1082348] + ImageMagick-CVE-2017-12693.patch- security update (icon.c): * CVE-2017-9405 [bsc#1042911] + ImageMagick-CVE-2017-9405.patch- security update (dib.c): * CVE-2017-11528 [bsc#1050119] + ImageMagick-CVE-2017-11528.patch- security update (ept.c): * CVE-2017-11530 [bsc#1050122] + ImageMagick-CVE-2017-11530.patch- security update (uil.c): * CVE-2017-11533 [bsc#1050132] + ImageMagick-CVE-2017-11533.patch- security update (map.c): * CVE-2017-12663 [bsc#1052754] + ImageMagick-CVE-2017-12663.patch- security update (msl.c): * CVE-2017-12427 [bsc#1052248] + ImageMagick-CVE-2017-12427.patch * CVE-2017-14139 [bsc#1057163] + ImageMagick-CVE-2017-14139.patch * CVE-2017-17934 [bsc#1074170] + ImageMagick-CVE-2017-17934.patch- security update (mvg.c): * CVE-2017-12566 [bsc#1052472] + ImageMagick-CVE-2017-12566.patch- security update (map.c): * CVE-2017-11638, CVE-2017-11642 [bsc#1050617] + ImageMagick-CVE-2017-11638,11642.patch- security update (miff.c): * CVE-2017-13131 [bsc#1055229] + ImageMagick-CVE-2017-13131.patch- security update (tga.c): * CVE-2017-11170 [bsc#1048272] + ImageMagick-CVE-2017-11170.patch- security update (xwd.c): * CVE-2017-11166 [bsc#1048110] + ImageMagick-CVE-2017-11166.patch- security update (pdb.c): * CVE-2017-12674 [bsc#1052711] + ImageMagick-CVE-2017-12674.patch- security udpate (cut.c): * CVE-2017-14060 [bsc#1056768] + ImageMagick-CVE-2017-14060.patch- security update (psd.c): * [bsc#1074118] + ImageMagick-psd.c-update.patch- security update: * CVE-2017-11531 [bsc#1050126] + ImageMagick-histogram.c-update.patch- security update (dcm.c): * CVE-2018-5357 [bsc#1075821] + ImageMagick-CVE-2018-5357.patch * CVE-2018-6405 [bsc#1078433] and CVE-2018-11656 [bsc#1095726] + ImageMagick-CVE-2018-6405,11656.patch- security update (jpeg.c): * CVE-2017-11450 [bsc#1049374] + ImageMagick-CVE-2017-11450.patch * CVE-2017-11448 [bsc#1049375] + ImageMagick-CVE-2017-11448.patch- security update (pcx.c): * CVE-2017-12432 [bsc#1052254] + ImageMagick-CVE-2017-12432.patch * CVE-2017-12668 [bsc#1052688] + ImageMagick-CVE-2017-12668.patch * CVE-2017-14224 [bsc#1058009] + ImageMagick-CVE-2017-14224.patch * CVE-2017-13058 [bsc#1055069] + ImageMagick-CVE-2017-13058.patch- security update (palm.c): * CVE-2017-9407 [bsc#1042824] + ImageMagick-CVE-2017-9407.patch * CVE-2017-11537 [bsc#1050048] + ImageMagick-CVE-2017-11537.patch * CVE-2017-12664 [bsc#1052750] + ImageMagick-CVE-2017-12664.patch- security update (meta.c): * CVE-2017-12418 [bsc#1052207] + ImageMagick-CVE-2017-12418.patch- security update (pict.c): * CVE-2017-12665 [bsc#1052747] + ImageMagick-CVE-2017-12665.patch * CVE-2017-12654 [bsc#1052761] + ImageMagick-CVE-2017-12654.patch * CVE-2017-17885 [bsc#1074119] + ImageMagick-CVE-2017-17885.patch- security update (tiff.c): * CVE-2017-18028 [bsc#1076182] + ImageMagick-CVE-2017-18028.patch- security update (psd.c): * CVE-2017-17681 [bsc#1072901] + ImageMagick-CVE-2017-17681.patch- security update (pwp.c): * CVE-2017-18008 [bsc#1074309] + ImageMagick-CVE-2017-18008.patch- security update (bmp.c): * CVE-2018-5685 [bsc#1075939] + ImageMagick-CVE-2018-5685.patch- security update (cip.c): * CVE-2017-11639 [bsc#1050635] + ImageMagick-CVE-2017-11639.patch- secruity update (cin.c): * CVE-2017-11525 [bsc#1050098] + ImageMagick-CVE-2017-11525.patch- readd MagickMin() to mat.c- security update (png.c): * CVE-2017-9262 [bsc#1043353] * CVE-2017-9261 [bsc#1043354] * CVE-2017-10995 [bsc#1047908] * CVE-2017-11539 [bsc#1050037] * CVE-2017-11505 [bsc#1050072] * CVE-2017-11526 [bsc#1050100] * CVE-2017-11750 [bsc#1051442] * CVE-2017-12565 [bsc#1052470] * CVE-2017-12676 [bsc#1052708] * CVE-2017-12673 [bsc#1052717] * CVE-2017-12671 [bsc#1052721] * CVE-2017-12643 [bsc#1052768] * CVE-2017-12641 [bsc#1052777] * CVE-2017-12640 [bsc#1052781] * CVE-2017-12935 [bsc#1054600] * CVE-2017-13059 [bsc#1055068] * CVE-2017-13147 [bsc#1055374] * CVE-2017-13142 [bsc#1055455] * CVE-2017-13141 [bsc#1055456] * CVE-2017-14103 [bsc#1057000] * CVE-2017-14649 [bsc#1060162] * CVE-2017-15218 [bsc#1062752] * CVE-2017-17504 [bsc#1072362] * CVE-2017-17884 [bsc#1074120] * CVE-2017-17879 [bsc#1074125] * CVE-2017-17914 [bsc#1074185] - added patches + ImageMagick-CVE-2017-9262.patch + ImageMagick-CVE-2017-9261.patch + ImageMagick-CVE-2017-10995.patch + ImageMagick-CVE-2017-11539.patch + ImageMagick-CVE-2017-11505,11526.patch + ImageMagick-CVE-2017-12565,12641.patch + ImageMagick-CVE-2017-11750,12676,12643.patch + ImageMagick-CVE-2017-12673.patch + ImageMagick-CVE-2017-12671,13141.patch + ImageMagick-CVE-2017-12640.patch + ImageMagick-CVE-2017-13059.patch + ImageMagick-CVE-2017-13142.patch + ImageMagick-CVE-2017-15218.patch + ImageMagick-CVE-2017-17504.patch + ImageMagick-CVE-2017-17884.patch + ImageMagick-CVE-2017-17879.patch + ImageMagick-CVE-2017-17914.patch + ImageMagick-png.c-other-fixes.patch- security update (pattern.c): * CVE-2018-5246 [bsc#1074973] + ImageMagick-CVE-2018-5246.patch- security update (core): * CVE-2017-18022 [bsc#1074975] + ImageMagick-CVE-2017-18022.patch- security update (rla.c): * CVE-2018-5247 [bsc#1074969] + ImageMagick-CVE-2018-5247.patch- security update (mat.c): * CVE-2017-12672 [bsc#1052720] * CVE-2017-13060 [bsc#1055065] * CVE-2017-11724 [bsc#1051446] * CVE-2017-12670 [bsc#1052731] * CVE-2017-12667 [bsc#1052732] * CVE-2017-13146 [bsc#1055323] * CVE-2017-10800 [bsc#1047044] * CVE-2017-13648 [bsc#1055434] * CVE-2017-11141 [bsc#1047898] * CVE-2017-11529 [bsc#1050120] * CVE-2017-12564 [bsc#1052468] * CVE-2017-12434 [bsc#1052550] * CVE-2017-12675 [bsc#1052710] * CVE-2017-14326 [bsc#1058640] * CVE-2017-11644 [bsc#1050606] * CVE-2017-13658 [bsc#1055855] * CVE-2017-14533 [bsc#1059751] * CVE-2017-17881 [bsc#1074123] * CVE-2017-18029 [bsc#1076021] * CVE-2017-18027 [bsc#1076051] - added ImageMagick-mat.c-update.patch, update of mat.c to 6.9.9-31's version- security update (dds.c): * CVE-2017-1000476 [bsc#1074610] + ImageMagick-CVE-2017-1000476.patch- security update (mpc.c): * CVE-2017-9409 [bsc#1042948] + ImageMagick-CVE-2017-9409.patch * CVE-2017-11449 [bsc#1049373] + ImageMagick-CVE-2017-11449.patch * CVE-2017-12430 [bsc#1052252], CVE-2017-12429 [bsc#1052251] + ImageMagick-CVE-2017-12430,12429.patch * CVE-2017-12642 [bsc#1052771] + ImageMagick-CVE-2017-12642.patch * CVE-2017-14249 [bsc#1058082] + ImageMagick-CVE-2017-14249.patch- security update (core): * CVE-2017-1000445 [bsc#1074425] + ImageMagick-CVE-2017-1000445.patch- security update (xpm.c): * CVE-2017-11751 [bsc#1051412] + ImageMagick-CVE-2017-11751.patch * CVE-2017-17680, CVE-2017-17882 [bsc#1072902], [bsc#1074122] + ImageMagick-CVE-2017-17680,17882.patch- security update (xcf.c): * CVE-2017-14343, CVE-2017-12691 [bsc#1058422], [bsc#1082363] ImageMagick-CVE-2017-14343,12691.patch- security update (pnm.c): * CVE-2017-14042 [bsc#1056550] + ImageMagick-CVE-2017-14042.patch- security update (psd.c): * CVE-2017-15281 [bsc#1063049] + ImageMagick-CVE-2017-15281.patch * CVE-2017-13061 [bsc#1055063] + ImageMagick-CVE-2017-13061.patch * CVE-2017-12563 [bsc#1052460] + ImageMagick-CVE-2017-12563.patch * CVE-2017-14174 [bsc#1057723] + ImageMagick-CVE-2017-14174.patch- security update (meta.c): * CVE-2017-13062 [bsc#1055053] + ImageMagick-CVE-2017-13062.patch- security update (gif.c): * CVE-2017-15277 [bsc#1063050] + ImageMagick-CVE-2017-15277.patch- security update (rle.c): * CVE-2017-14733 [bsc#1060577] + ImageMagick-CVE-2017-14733.patch- security update (cals.c): * CVE-2017-12669 [bsc#1052689] + ImageMagick-CVE-2017-12669.patch- security update (magick.c): * CVE-2017-11752 [bsc#1051441] + ImageMagick-CVE-2017-11752.patch- security update (pdf.c): * CVE-2017-12662 [bsc#1052758] + ImageMagick-CVE-2017-12662.patch- security update (ps.c): * CVE-2017-11535 [bsc#1050139] + ImageMagick-CVE-2017-11535.patch * CVE-2017-14172 [bsc#1057730] + ImageMagick-CVE-2017-14172.patch- security update (dcm.c): * CVE-2017-12140, CVE-2017-12644 [bsc#1052764] [bsc#1051847] + ImageMagick-CVE-2017-12140,12644.patch- security update (dpx.c): * CVE-2017-11188 [bsc#1048457] + ImageMagick-CVE-2017-11188.patch * CVE-2017-11527 [bsc#1050116] + ImageMagick-CVE-2017-11527.patch- security update (annotate.c): * CVE-2017-14989 [bsc#1061254] + ImageMagick-CVE-2017-14989.patch- security update (token.c): * CVE-2017-14682 [bsc#1060176] + ImageMagick-CVE-2017-14682.patch- security update (annotate.c): * [bsc#1052744] + ImageMagick-unable-to-read-font-memory-leaks.patch- security update (tiff.c): * CVE-2017-14607 [bsc#1059778] + ImageMagick-CVE-2017-14607.patch * CVE-2017-11640 [bsc#1050632] + ImageMagick-CVE-2017-11640.patch- security update (wpg.c): * CVE-2017-14342 [bsc#1058485] + ImageMagick-CVE-2017-14342.patch * CVE-2017-14341 [bsc#1058637] + ImageMagick-CVE-2017-14341.patch * CVE-2017-16546 [bsc#1067181] + ImageMagick-CVE-2017-16546.patch * CVE-2017-16545 [bsc#1067184] + ImageMagick-CVE-2017-16545.patch * CVE-2017-16669 [bsc#1067409], CVE-2017-17682 [bsc#1072898] + GraphicsMagick-CVE-2017-16669.patch- security update: * CVE-2017-14175 [bsc#1057719] + ImageMagick-CVE-2017-14175.patch- security update: * CVE-2017-14138 [bsc#1057157] + ImageMagick-CVE-2017-14138.patch- security update: * CVE-2017-13769 [bsc#1056432] + ImageMagick-CVE-2017-13769.patch- security update: * CVE-2017-13134 [bsc#1055214] + ImageMagick-CVE-2017-13134.patch- security update: * CVE-2017-15217 [bsc#1062750] + ImageMagick-CVE-2017-15217.patch- security update: * CVE-2017-11478 [bsc#1049796] + ImageMagick-CVE-2017-11478.patch- security update: * CVE-2017-15930 [bsc#1066003] + ImageMagick-CVE-2017-15930.patch- security update: * CVE-2017-12983 [bsc#1054757] + ImageMagick-CVE-2017-12983.patch- security update: * CVE-2017-14531 [bsc#1059666] + ImageMagick-CVE-2017-14531.patch- security update: * CVE-2017-12435 [bsc#1052553] + ImageMagick-CVE-2017-12435.patch- security update: * CVE-2017-12587 [bsc#1052450] + ImageMagick-CVE-2017-12587.patch- security update: * CVE-2017-11523 [bsc#1050083] + ImageMagick-CVE-2017-11523.patch * CVE-2017-14173 [bsc#1057729] + ImageMagick-CVE-2017-14173.patch- security update: * CVE-2017-11446 [bsc#1049379] + ImageMagick-CVE-2017-11446.patch * CVE-2017-12433 [bsc#1052545] + ImageMagick-CVE-2017-12433.patch- security update: * CVE-2017-12428 [bsc#1052249], CVE-2017-12431 [bsc#1052253], CVE-2017-11534 [bsc#1050135] + ImageMagick-CVE-2017-12428,12431,11534.patch- security update: * CVE-2017-13133 [bsc#1055219] + ImageMagick-CVE-2017-13133.patch- security update: * CVE-2017-13139 [bsc#1055430] + ImageMagick-CVE-2017-13139.patch- recommend ghostscript [bsc#1054924c#25]- security update: * CVE-2017-15033 [bsc#1061873] + ImageMagick-CVE-2017-15033.patch- revert wrong part of CVE-2016-7530 fix [bsc#1054924] * amended ImageMagick-CVE-2016-7530.patch- security update: * CVE-2017-11403 [bsc#1049072] + ImageMagick-CVE-2017-11403.patch- security update: * CVE-2017-9440 [bsc#1042812] + ImageMagick-CVE-2017-9440.patch * CVE-2017-9439 [bsc#1042826] + ImageMagick-CVE-2017-9439.patch * CVE-2017-9501 [bsc#1043289] + ImageMagick-CVE-2017-9501.patch- security update: * CVE-2017-9143 [bsc#1040306] + ImageMagick-CVE-2017-9143.patch * CVE-2017-9142 [bsc#1040304] + ImageMagick-CVE-2017-9142.patch * CVE-2017-9141 [bsc#1040303] + ImageMagick-CVE-2017-9141.patch * CVE-2017-9144 [bsc#1040332] + ImageMagick-CVE-2017-9144.patch- security update: * CVE-2017-9098 [bsc#1040025] + ImageMagick-CVE-2017-9098.patch- security update: * CVE-2017-8344 [bsc#1036978] + ImageMagick-CVE-2017-8344.patch * CVE-2017-8345, CVE-2017-8350 [bsc#1036980] [bsc#1036985] + ImageMagick-CVE-2017-8345,8350.patch * CVE-2017-8346 [bsc#1036981] + ImageMagick-CVE-2017-8346.patch * CVE-2017-8357 [bsc#1036976] + ImageMagick-CVE-2017-8357.patch * CVE-2017-8343 [bsc#1036977] + ImageMagick-CVE-2017-8343.patch * CVE-2017-8347 [bsc#1036982] + ImageMagick-CVE-2017-8347.patch * CVE-2017-8348 [bsc#1036983] + ImageMagick-CVE-2017-8348.patch * CVE-2017-8349 [bsc#1036984] + ImageMagick-CVE-2017-8349.patch * CVE-2017-8351 [bsc#1036986] + ImageMagick-CVE-2017-8351.patch * CVE-2017-8352 [bsc#1036987] + ImageMagick-CVE-2017-8352.patch * CVE-2017-8353 [bsc#1036988] + ImageMagick-CVE-2017-8353.patch * CVE-2017-8354 [bsc#1036989] + ImageMagick-CVE-2017-8354.patch * CVE-2017-8355 [bsc#1036990] + ImageMagick-CVE-2017-8355.patch * CVE-2017-8356 [bsc#1036991] + ImageMagick-CVE-2017-8356.patch * CVE-2017-7606 [bsc#1033091] + ImageMagick-CVE-2017-7606.patch * CVE-2017-8765 [bsc#1037527] + ImageMagick-CVE-2017-8765.patch * CVE-2017-8830 [bsc#1038000] + ImageMagick-CVE-2017-8830.patch- security update: * CVE-2017-7943 [bsc#1034870] + ImageMagick-CVE-2017-7943.patch * CVE-2017-7942 [bsc#1034872] + ImageMagick-CVE-2017-7942.patch * CVE-2017-7941 [bsc#1034876] + ImageMagick-CVE-2017-7941.patch- security update: * CVE-2017-6502 [bsc#1028075] + ImageMagick-CVE-2017-6502.patch- security update: * CVE-2016-10049 [bsc#1017311] + ImageMagick-CVE-2016-10049.patch * CVE-2016-10050 [bsc#1017312] + ImageMagick-CVE-2016-10050.patch * CVE-2016-10051 [bsc#1017313] + ImageMagick-CVE-2016-10051.patch * CVE-2016-10052 [bsc#1017314] + ImageMagick-CVE-2016-10052.patch * CVE-2016-10144 [bsc#1020433] + ImageMagick-CVE-2016-10144.patch * CVE-2016-10145 [bsc#1020435] + ImageMagick-CVE-2016-10145.patch * CVE-2017-5506 [bsc#1020436] + ImageMagick-CVE-2017-5506.patch * CVE-2016-10059 [bsc#1017318] + ImageMagick-CVE-2016-10059.patch * CVE-2016-10046 [bsc#1017308] + ImageMagick-CVE-2016-10046.patch * CVE-2016-10048 [bsc#1017310] + ImageMagick-CVE-2016-10048.patch * CVE-2017-5508 [bsc#1020441] + ImageMagick-CVE-2017-5508.patch * CVE-2016-10146 [bsc#1020443] + ImageMagick-CVE-2016-10146.patch * CVE-2016-10063 [bsc#1017320] + ImageMagick-CVE-2016-10063.patch * CVE-2017-5510 [bsc#1020446] + ImageMagick-CVE-2017-5510.patch * CVE-2016-10065 [bsc#1017322] + ImageMagick-CVE-2016-10065.patch * CVE-2017-5511 [bsc#1020448] + ImageMagick-CVE-2017-5511.patch- revert bogus ImageMagick-CVE-2016-9773.patch, ImageMagick-6 is not affected by CVE-2016-9773: http://www.imagemagick.org/discourse-server/viewtopic.php?t=31045 [bsc#1017421]- security update: * CVE-2016-8866 [bsc#1009318] + ImageMagick-CVE-2016-8866.patch * CVE-2016-9773 [bsc#1013376] + ImageMagick-CVE-2016-9773.patch * CVE-2016-8707 [bsc#1014159] + ImageMagick-CVE-2016-8707.patch- turn of make check - amend ImageMagick-CVE-2014-9848.patch to fix a regression discovered by one of the tests- security update: * CVE-2016-9556 [bsc#1011130] + ImageMagick-CVE-2016-9556.patch * CVE-2016-9559 [bsc#1011136] + ImageMagick-CVE-2016-9559.patch- update incomplete patch * CVE-2016-6823 [bsc#1001066] changed ImageMagick-CVE-2016-6823.patch- renaming the patch for CVE-2015-8957 to declared name- security update: * CVE-2016-8862 [bsc#1007245] + ImageMagick-CVE-2016-8862.patch- security update: * CVE-2016-8684 [bsc#1005123] + ImageMagick-CVE-2016-8684.patch * CVE-2016-8682 [bsc#1005125] + ImageMagick-CVE-2016-8682.patch * CVE-2016-8683 [bsc#1005127] + ImageMagick-CVE-2016-8683.patch * CVE-2016-8677 [bsc#1005328] + ImageMagick-CVE-2016-8677.patch- security update: * CVE-2016-7540 [bsc#1000394] + ImageMagick-CVE-2016-7540.patch * CVE-2016-7529 [bsc#1000399] + ImageMagick-CVE-2016-7529.patch * CVE-2016-7530 [bsc#1000399], [bsc#1000703] + ImageMagick-CVE-2016-7530.patch * CVE-2016-7528 [bsc#1000434] + ImageMagick-CVE-2016-7528.patch * CVE-2016-7513 [bsc#1000686] + ImageMagick-CVE-2016-7513.patch * CVE-2016-7526, CVE-2016-7527 [bsc#1000436] + ImageMagick-CVE-2016-7526.patch + ImageMagick-CVE-2016-7527.patch * CVE-2016-7514 [bsc#1000688] + ImageMagick-CVE-2016-7514.patch * CVE-2016-7515 [bsc#1000689] + ImageMagick-CVE-2016-7515.patch * CVE-2015-8957 [bsc#1000690] + ImageMagick-CVE-2015-8957.patch * CVE-2015-8958, CVE-2016-7518 [bsc#1000691] [bsc#1000694] + ImageMagick-CVE-2015-8958,CVE-2016-7518.patch * CVE-2016-7516 [bsc#1000692] + ImageMagick-CVE-2016-7516.patch * CVE-2016-7517 [bsc#1000693] + ImageMagick-CVE-2016-7517.patch * CVE-2016-7519 [bsc#1000695] + ImageMagick-CVE-2016-7519.patch * CVE-2016-7520 [bsc#1000696] + ImageMagick-CVE-2016-7520.patch * CVE-2016-7521 [bsc#1000697] + ImageMagick-CVE-2016-7521.patch * CVE-2016-7522 [bsc#1000698] + ImageMagick-CVE-2016-7522.patch * CVE-2016-7523 [bsc#1000699] + ImageMagick-CVE-2016-7523.patch * CVE-2016-7524 [bsc#1000700], CVE-2016-7800 [bsc#1002422] + ImageMagick-CVE-2016-7524,7800.patch * CVE-2016-7525 [bsc#1000701] + ImageMagick-CVE-2016-7525.patch * CVE-2016-7531 [bsc#1000704] + ImageMagick-CVE-2016-7531.patch * CVE-2016-7532 [bsc#1000706] + ImageMagick-CVE-2016-7532.patch * CVE-2016-7533 [bsc#1000707] + ImageMagick-CVE-2016-7533.patch * CVE-2016-7534 [bsc#1000708] + ImageMagick-CVE-2016-7534.patch * CVE-2016-7535 [bsc#1000709] + ImageMagick-CVE-2016-7535.patch * CVE-2016-7537 [bsc#1000711] + ImageMagick-CVE-2016-7537.patch * CVE-2016-7538 [bsc#1000712] + ImageMagick-CVE-2016-7538.patch * CVE-2015-8959 [bsc#1000713], CVD-2014-9907 [bsc#1000714] - ImageMagick-CVE-2016-5687.patch + ImageMagick-CVE-2016-5687,CVE-2015-8959,CVE-2014-9907.patch * CVE-2016-7539 [bsc#1000715] + ImageMagick-CVE-2016-7539.patch * CVE-2016-6823 [bsc#1001066] + ImageMagick-CVE-2016-6823.patch * CVE-2016-7101 [bsc#1001221] + ImageMagick-CVE-2016-7101.patch * do not divide by zero in WriteTIFFImage [bsc#1002206] + ImageMagick-write-tiff-div-by-zero.patch * fix buffer overflows [bsc#1002209] + ImageMagick-buffer-overflow-pdb,map,tiff.patch * CVE-2016-7799 [bsc#1002421] + ImageMagick-CVE-2016-7799.patch * CVE-2016-7996, CVE-2016-7997 [bsc#1003629] + ImageMagick-CVE-2016-7996,7997.patch * CVE-2016-10060 [bsc#1017319] + ImageMagick-CVE-2016-10060.patch * CVE-2016-10061 [bsc#1017319] + ImageMagick-CVE-2016-10061.patch * CVE-2016-10062 [bsc#1017319] + ImageMagick-CVE-2016-10062.patch * CVE-2016-10064 [bsc#1017321] + ImageMagick-CVE-2016-10064.patch * CVE-2016-10068 [bsc#1017324] + ImageMagick-CVE-2016-10068.patch * CVE-2016-10069 [bsc#1017325] + ImageMagick-CVE-2016-10069.patch * CVE-2016-10070 [bsc#1017326] + ImageMagick-CVE-2016-10070.patch * CVE-2016-10071 [bsc#1017326] + ImageMagick-CVE-2016-10071.patch * CVE-2017-5507 [bsc#1020439] + ImageMagick-CVE-2017-5507.patch- security update: * CVE-2016-6520 [bsc#991872] + ImageMagick-CVE-2016-6520.patch * CVE-2016-5010 [bsc#991444] + ImageMagick-CVE-2016-5010.patch * CVE-2016-6491 [bsc#991445] + ImageMagick-CVE-2016-6491.patch- security update: * CVE-2016-5841 [bsc#986609] + ImageMagick-CVE-2016-5841.patch * CVE-2016-5842 [bsc#986608] + ImageMagick-CVE-2016-5842.patc- security update: * CVE-2015-8902 [bsc#983253] + ImageMagick-CVE-2015-8902.patch * CVE-2015-8901 [bsc#983234] + ImageMagick-CVE-2015-8901.patch * CVE-2015-8903 [bsc#983259] + ImageMagick-CVE-2015-8903.patch * CVE-2015-8900 [bsc#983232] + ImageMagick-CVE-2015-8900.patch * CVE-2016-4562, CVE-2016-4563, CVE-2016-4564 [bsc#983292] [bsc#983305] [bsc#983308] + ImageMagick-CVE-2016-4562,4563,4564.patch * CVE-2014-9846 [bsc#983521] + ImageMagick-CVE-2014-9846.patch * CVE-2015-8894 [bsc#983523] + ImageMagick-CVE-2015-8894.patch * CVE-2015-8895 [bsc#983527] + ImageMagick-CVE-2015-8895.patch * CVE-2015-8896 [bsc#983533] + ImageMagick-CVE-2015-8896.patch * CVE-2015-8897 [bsc#983739] + ImageMagick-CVE-2015-8897.patch * CVE-2015-8898 [bsc#983746] + ImageMagick-CVE-2015-8898.patch * CVE-2014-9805 [bsc#983752] + ImageMagick-CVE-2014-9805.patch * CVE-2014-9806 [bsc#983774] + ImageMagick-CVE-2014-9806.patch * CVE-2014-9807 [bsc#983794] + ImageMagick-CVE-2014-9807.patch * CVE-2014-9808 [bsc#983796] + ImageMagick-CVE-2014-9808.patch * CVE-2014-9809 [bsc#983799] + ImageMagick-CVE-2014-9809.patch * CVE-2014-9810 [bsc#983803] + ImageMagick-CVE-2014-9810.patch * CVE-2014-9821 [bsc#984014] + ImageMagick-CVE-2014-9821.patch * CVE-2014-9849 [bsc#984018] + ImageMagick-CVE-2014-9849.patch * CVE-2014-9836 [bsc#984023] + ImageMagick-CVE-2014-9836.patch * CVE-2014-9828 [bsc#984028] + ImageMagick-CVE-2014-9828.patch * CVE-2014-9813 [bsc#984035] + ImageMagick-CVE-2014-9813.patch * CVE-2014-9830 [bsc#984135] + ImageMagick-CVE-2014-9830.patch * CVE-2014-9811 [bsc#984032] + ImageMagick-CVE-2014-9811.patch * CVE-2014-9812 [bsc#984137] + ImageMagick-CVE-2014-9812.patch * CVE-2014-9819 [bsc#984142] + ImageMagick-CVE-2014-9819.patch * CVE-2014-9847 [bsc#984144] + ImageMagick-CVE-2014-9847.patch * CVE-2014-9835, CVE-2014-9831 [bsc#984145] [bsc#984375] + ImageMagick-CVE-2014-9835,9831.patch * CVE-2014-9850 [bsc#984149] + ImageMagick-CVE-2014-9850.patch * CVE-2014-9820 [bsc#984150] + ImageMagick-CVE-2014-9820.patch * CVE-2014-9851 [bsc#984160] + ImageMagick-CVE-2014-9851.patch * CVE-2014-9837 [bsc#984166] + ImageMagick-CVE-2014-9837.patch * CVE-2014-9841 [bsc#984172] + ImageMagick-CVE-2014-9841.patch * CVE-2014-9843 [bsc#984179] + ImageMagick-CVE-2014-9843.patch * CVE-2014-9818, CVE-2014-9826,CVE-2014-9829 [bsc#984181] [bsc#984186] [bsc#984409] + ImageMagick-CVE-2014-9818,9826,9829.patch * CVE-2014-9832 [bsc#984183] + ImageMagick-CVE-2014-9832.patch * CVE-2014-9854 [bsc#984184] + ImageMagick-CVE-2014-9854.patch * CVE-2014-9824 [bsc#984185] + ImageMagick-CVE-2014-9824.patch * CVE-2014-9822 [bsc#984187] + ImageMagick-CVE-2014-9822.patch * CVE-2014-9852 [bsc#984191] + ImageMagick-CVE-2014-9852.patch * CVE-2014-9814 [bsc#984193] + ImageMagick-CVE-2014-9814.patch * CVE-2014-9838 [bsc#984370] + ImageMagick-CVE-2014-9838.patch * CVE-2014-9815 [bsc#984372] + ImageMagick-CVE-2014-9815.patch * CVE-2014-9844 [bsc#984373] + ImageMagick-CVE-2014-9844.patch * CVE-2014-9842 [bsc#984374] + ImageMagick-CVE-2014-9842.patch * CVE-2014-9839 [bsc#984379] + ImageMagick-CVE-2014-9839.patch * CVE-2014-9845 [bsc#984394] + ImageMagick-CVE-2014-9845.patch * CVE-2014-9816 [bsc#984398] + ImageMagick-CVE-2014-9816.patch * CVE-2014-9817 [bsc#984400] + ImageMagick-CVE-2014-9817.patch * CVE-2014-9823 [bsc#984401] + ImageMagick-CVE-2014-9823.patch * CVE-2014-9848 [bsc#984404] + ImageMagick-CVE-2014-9848.patch * CVE-2014-9833, CVE-2014-9825 [bsc#984406] [bsc#984427] + ImageMagick-CVE-2014-9833,9825.patch * CVE-2014-9853 [bsc#984408] + ImageMagick-CVE-2014-9853.patch * CVE-2014-9840 [bsc#984433] + ImageMagick-CVE-2014-9840.patch * CVE-2014-9834 [bsc#984436] + ImageMagick-CVE-2014-9834.patch * CVE-2016-5688 [bsc#985442] + ImageMagick-CVE-2016-5688.patch * CVE-2016-5687 [bsc#985448] + ImageMagick-CVE-2016-5687.patch * CVE-2016-5691 [bsc#985456] + ImageMagick-CVE-2016-5691.patch * CVE-2016-5690 [bsc#985451] + ImageMagick-CVE-2016-5690.patch * CVE-2016-5689 [bsc#985460] + ImageMagick-CVE-2016-5689.patch- security update: * CVE-2016-5118 [bsc#982178] + ImageMagick-CVE-2016-5118.patch- Use external svg loader (rsvg) - Disable insecure coders [bnc#978061] * ImageMagick-6.8.8-1-disable-insecure-coders.patch * CVE-2016-3714 * CVE-2016-3715 * CVE-2016-3716 * CVE-2016-3717 * CVE-2016-3718- fix encoding of /Title in generated pdf [bnc#867943] + ImageMagick-pdf-title-encoding.patch- fix default value of the image in pdf [bnc#950872]- Leap: directories in libMagickCore depends on %{clibver} and %{quantum_depth} [bnc#948017]- security update CVE-2014-8716 [bnc#905260] * ImageMagick-CVE-2014-8716.patch- security update: CVE-2014-8354, CVE-2014-8355, CVE-2014-8562 * ImageMagick-CVE-2014-8354.patch [bnc#903204] * ImageMagick-CVE-2014-8355.patch [bnc#903216] * ImageMagick-CVE-2014-8562.patch [bnc#903638]- Fix license tag to comply with SPDX 1.2.- fix `cat img | display` [bnc#882456] - added patches: * ImageMagick-6.8.8.1-display-stdin.patch- remove dependency on gpg-offline (blocks rebuilds and tarball integrity is checked by source-validator anyway)- modified patches [bnc#843673]: * disable_mat_test.patch -- rather than disable the test, use upstream solution (increase threshold for mean error) - - use this patch also for s390, s390x- updated to 6.8.8-1: * Support points argument for draw MSL element. * The -page option now correctly sets the image page offset. * The -evaluate-sequence sum returns a proper alpha channel now. * etc. see ChangeLog- really disable parallel build, don't just have a comment about it- updated to 6.8.7-10: * fix crash when using -resize with GPU acceleration- updated to 6.8.7-9: * fixed bug in coders/png.c that caused -define png:color-type=0 to fail * fixed bug in automatic selection of OpenCL device * simplified interface to initialize the OpenCL environment * Fix possible memory corruption when writing PSD image * etc. see ChangeLog- added openexr-devel as build requirement to enable openexr support- use fdupes -s [bnc#841472]- disable mat tests for powerpc bnc#843673 (disable_mat_test.patch)- documentation back to -doc package (bnc#841472)- fix baselibs.conf for previous change- setting quantum depth to 16 [bnc#840825]- fix build (find doesn't support -perm +mode)- updated to 6.8.6-9 * Fixed infinite loop with jpeg:extent. * Fixed performance issue when converting jpeg to png. * Added "-define bmp:format=bmp2|bmp3|bmp4" option. * etc. see ChangeLog- updated to 6.8.6-7 * Fix memory leak in CloneImageArtifacts and CloneImageProfiles. * JPEG ICC color profile requires null after ICC tag * etc. - employ gpg-offline- use AllCompliance instead of X11Compliance to cover also 'None' [bnc#825151] * adjusted no-XPMCompliance.patch- mark no-XPMCompliance.patch as suse specific http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23462- workaround: fix reading xpm which uses symbolic color names which are said to be not XPMCompliant * http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=23462- update to 6.8.5-7: * fixes reading XPM- update to 6.8.5-6: * fixed 'Sometimes an sRGB image is masquerading as grayscale' * fixed 'The stream utility no longer faults when exporting float pixels' * Labels no longer overflow * Change the sample JPEG quantization table xml to something that works really well with 2x2 Chroma subsampling around quality 75. * Eliminate whitespace from image properties that hold PNG chunk data. * etc. see ChangeLog - remove fix-wand.pc.patch, the issue is fixed upstream - remove test-signatures.patch, the issue is fixed upstream- add ImageMagick-6.8.4.0-fix-wand.pc.patch to fix build of e.g. emacs and xine-lib, who rely on pkg-config --libs Wand returning actually MagickWand and not MagickCore (looks like a copy&paste error of upstream)- update to 6.8.4-0: * dropped ImageMagick-6.8.2.4-revert-r9087-montage-signatures.patch, issue is almost fixed -> new test-signatures.patch, see followups in http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=22479 * created rpath.patch * created dont-build-in-install.patch - upstream changes * Do not write zero-length TIFF tags * Do not split words for caption * The -blur, -guassian-blur, and -sharpen are now convenience methods for -morphology convolve. * etc. see ChangeLog- fix baselibs.conf- use versioned /etc/ImageMagick* to allow parallel installation of libMagickCore- name library packages after the new -QN library names (thanks dstoecker) - depend on newer libtiff- fix missed variable expansion- use a quantum depth of 8 for our package, as we do not require that amount of precision, and we prefer faster conversions with less heap usage.- updated to 6.8.2.4 * Update libver to 7 * Dropped upstreamed ImageMagick-uninitialized-memory.patch * Added ImageMagick-6.8.2.4-revert-r9087-montage-signatures.patch Related to GhostScript. Discussion: http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=22479&p=95023 * Add support for -QN library and .pc names, that express the pixel quantum depth the library was compiled with. Added an explicit spec variable for it * BuildRequire autoconf >= 2.69- fix wrong mean-error output: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=22586 * dropped disable-matlab-test.patch * added ImageMagick-uninitialized-memory.patch- do not disable checking altogether. - disable-matlab-test.patch: disable the 1 MATLAB testcase that fails.- disable check for the moment, it breaks on Factory and 12.1, but 12.2- enable support for Pango markup * this allows rendering formatted text with the pango:"..." syntax see http://www.imagemagick.org/Usage/text/#pango for details * to actually use this, libpango needs to be installed- updated to 6.7.8.8: * Added 2d named convolution kernel Binomial (for Fred Wienhaus) * Clean up sigmoidal-contrast. * Use ConcatenateString() for multi-block GIF comments. * Caption no longer chops off text (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=21558). * Support LUV colorspace. * Support HCL colorspace. * Don't transform the composite image colorspace, set it instead. * Interpret -border 5% as 5% of width and 5% of height (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=21537). * Don't normalize zero-sum kernels (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=21584). * Transform grayscale to linear RGB if fill color is non-gray (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=21586). etc. see ChangeLog- updated to 6.7.6.9: * Don't write an invalid PNG sRGB chunk when rendering intent is undefined. * EXR images are in the linear RGB colorspace with a gamma of 1.0. * Correct annotation offset for right-to-left labels. * The -level 100x0% now produces the equivalent of -negate. * etc., see ChangeLog- cleanup the package - updated to 6.7.6.1: fixes * CVE-2012-0247 [bnc#746880] * CVE-2012-0248 [bnc#746880] * CVE-2012-1185 [bnc#752879] * CVE-2012-1186 [bnc#752879]- moved the libtool archives to the main package - separated the bulk documentation - added a regression %check for the locale comma crash- license update: SUSE-ImageMagick Use SUSE- proprietary prefix until SPDX upstream accepts ImageMagick as license (e.g. like Fedora)- ImageMagick-devel requires libbz2-devel [bnc#741947]- update to 6.7.4.7: * Fixed -black-threshold and -white-threshold so they work properly with the -channels option * Promote image depths 9-15 to 16 to avoid crashing in the PNG encoder * Fix problems with JNG encoder "quality" * Fix memory leak in JP2 coder * Use maximum bounds when rendering PDF * etc. see ChangeLog- Add explicit libbz2-devel BuildRequires - Support LZMA - Use libcms2 now. - Cleanup huge dependency bloat in -devel package, this will likely cause build fails on dependant packages the solution is to fix your BuildRequires.- update to 6.7.3.3: * removed upstreamed scene.patch- build against librsvg as recommended upstream [bnc#724222]- add libtool as buildrequire to make the spec file more reliable- fixed [bnc#717871] -- imagemagick display wrong order * scene.patch- update to 6.7.2.7: * Fix memory leak in text annotation. * The "-strip" option was excluding the PNG tRNS chunk. * Caption now wraps properly for Chinese text. * The PNG encoder would sometimes fail to respect the -define PNG:color-type option when the incoming image was PseudoClass. * Properly handled continued JPEG embedded profiles. * Revert -colorspace sRGB option patch. * Revert -type PaletteMatte option patch. * etc. see ChangeLog. - obsoletes reason-error-message.patch- Remove redundant tags/sections from specfile- Fix baselibs: add missing requires to ImageMagick-devel - Remove redundant tags/sections- fixed wrong error messages [bnc#673303]- update to 6.7.1.0: * Defend against corrupt PSD resource blocks. * Properly allocate points when render text with large font size. * Added support for Z_RLE strategy in the png compressor, using - quality 98 or 99. * Handle "-quality 97" properly in the png encoder, i.e., use intrapixel filtering when writing a MNG file and no filtering when writing a PNG file. * Added "-define PNG:compression-level|strategy|filter=value" options to the PNG encoder. If these options are used, they take precedence over the -quality option. * Use zlib default compression strategy instead of Z_RLE and Z_FIXED strategies when linking with zlib versions (prior to 1.2.0 and 1.2.2.2, respectively) that don't support them. - switch on WEBP support -- require libwebp-devel to build- updated to 6.7.0.8: * added Initial implementation of Cylinder to/from Plane 3D Distorts Includes deritive (scaled lookup), and anti-alised horizon (validity) Currently can NOT handle extractions from full 360 cylinder panoramas. * Fix transient error for composite over operator. * Fix one-off bug in option parser. * etc., see ChangeLog - adjusted inc-struct.diff- fix requires of -devel package- remove the -fuse-linker-plugin option, it's default in gcc 4.6 and only confuses scripts- Require ImageMagick from -devel subpackage: Packages that depend on the -devel package very likely use the tools too.- updated to 6.6.9.9: * The -scale option nows considers the alpha channel when scaling. * Don't use comma as a separator for stroked tex. * Fix transient bug for HSL to RGB and back. * Fixed PNG8 reduction to work with an image that reduces to 256 colors plus transparency, by merging the two darkest red colors. * etc., see ChangeLog- created ImageMagick-devel-32bit for cross-compiling- updated to 6.6.9.5: fixes [Bug 682238] * macroized and cleaned up scripts * added conditions for optional components * updated file lists for upstream * cleaned up the include tree in devel (patch)- updated to 6.6.8.9: fixes [bnc#682238] * config files moved to /etc/ImageMagick* * see ChangeLog for more details- updated to 6.6.7.9: fixes [bnc#673789] * removed survive-exif.patch- added patch for crash reading png with exif [bnc#673789]- packaged README.txt from xtp [bnc#671047]- fix build for factory- updated to 6.6.5-8: don't read config files from $CWD [bnc#653572]- updated to 6.6.5-5: * Revised PNG palette optimization * Added some debug logging in coders/png.c. * More precise blur values for Lanczos2Sharp and LanczosSharp. * Added location of first Mitchell crossing (=8/7) to the filters data structure. * Added Lanczos2D* filters now named Lanczos2* * Reorganization of AcquireFilter() to make it work better * Clearer EWA filters (LanczosSharp etc) comments. * Added LanczosSharp (3-lobe Lanczos with sharpening) * Filter sharpening factors are also always applied regardless of usage. * CubicBC filter formulas simplified by constant folding. In particular, P1 coefficient (always zero) removed from coeff. * Revert the Robidoux filter to a Keys cubic with C=(108 sqrt 2-29)/398 (as already specified in the documentation). * Ignore PS bounding box offsets if -page is set. * Add support for -evaluate exp.- updated to 6.6.5-0: * Added "filter:sigma" expert setting defining the 'sigma' for the Gaussian filter only. This is similar in action to 'blur' but only for Gaussians, and does not modify the filters support, allowing you to set a very small sigma, without the function 'missing' all pixels. * Patch for DrawableRotation() and DrawableTranslation() * The webp format requires the webpconv delegate program (experimental). * Replaced "Robidoux" with Cubic 'Keys' filter that is near equivelent to the previous sharped "Lanczos2D" filter. (C=0.31089212245300069) This also is very similer to a Mitchell filter but specifically designed for EWA use and is the new default filter for Distorting Images. * Added new filter 'Lanczos2D' a 2-lobe Lanczos as defined by Andreas Gustafsson in his thesis "Interactive Image Warping" (page 24) http://www.gson.org/thesis/warping-thesis.pdf * Added filter "Robidoux" which is a slightly sharpened version of the "Lanczos2D" filter (blur=0.958033808) specifically designed to be less 'blurry' for horizontal and vertical lines in no-op distortions. * Add support for "pattern:vertical2" and "pattern:horizontal2". * Add support for "pattern:vertical3" and "pattern:horizontal3". * Properly handle PSD layers with negative offsets. * Added sqrt(2) bluring default for Gaussian Filter if used as a Cylindrical EWA filter. This resulted removing the last aliasing issue that was present in tests for Gaussian EWA resampling. Of course it is still a very blury filter for default use in EWA. * Adjusted Variable Mapping Blur Composition so user arguments actual relate properly to the sigma of the blur for a maximum mapping value. * Fix horizon anti-alising for output-scaled perspective distortions. * 'Bessel' filter is now offically and more accuritally named 'Jinc' however 'Bessel' while not visible as a filter option can still be used as an internal alias for 'Jinc'. * Fix memory assertion with --enable-embeddable (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=17201). * Don't permit access to pixels when pinging an image (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=17194).- updated to 6.6.4-8: * Automatically set the quantum depth to 16 for HDRI. * IPTC profile not always wrapped properly inside an 8BIM profile. * TIFF tile geometry must be divisible by 16. * Rename of SincPolynomial to SincFast for easier user understanding. Ditto for LanczosChebyshev to LanzcosFast. * Switch default resize filters to using the faster SincPolynomial filter by default internally. However 'Sinc' will still use the Trigonometric function, and can be used to assign the trig version of Sinc() to filters using the filter expert options. * The default filter for 'distort' was found to be a very blurry inaccurate filter function. It was removed and replaced with a correct Gaussian filter (as used by resize) * Added a switch so that "-interpolate filter" will force the use of a cylindrical filter for ALL pixels in distorted images. That is you can use that switch to use a cylindrical filter even for images that are being enlarged by the distortion. However EWA is still currently using a fixed 2.0 sampling radius. This switch complements the use of "-filter point" which turns off EWA filters in favor of interpolation for all pixels in a distorted image. BOTH switches should not be used together. * A bug in the support radius of the EWA resampling function was found, now that correctly defined resize filters are being used. Suddenly Normal Gaussian distortions are not so blurry, and tests with distortions of the 'Rings' image show extremely good and clear results, with only minimal blurring. The filter 'blur' expert option can be used to adjust this further. * Don't negate the geometry offset for the -extent option. * The RGBO format is now listed as a supported format. * Added the Nicolas Robidoux and Chantal Racette Lanczos resize filter function as "LanczosChebyshev" as faster alternative to Lanczos. * Re-code Nicolas Robidoux and Chantal Racette Polynomial Approximation of the Sinc Trigonometric resize filter, as a proper filter to allow direct comparision and speed testing of the filter. * Expanded the "-set option:filter:verbose 1" output, so as to also include the actual functions and other values that were used to create the filter.- updated to 6.6.4-0: * Repair a few incorrect LocaleNCompare() calls (ttf.c, ps.c). * Path no longer closed if join style is round (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16943). * Add case for BGRQuantum to GetQuantumExtent(). * Support no compression on PCX write. * Fixed bug in the raw BGRA coders (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16880). * Fix off-by-one error in the PSD coders. * Nicolas Robidoux with the assistance of Chantal Racette contribute an approximation of the sinc function over the interval [-3,3]. * Eliminate a small memory leak in LevelizeImageChannel() (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16951). * Recognize -fx logtwo (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16958).- updated to 6.6.3-9: * Eliminate useless message about assuming zero delay when writing a single-frame MNG, and changed it from Error to Warning when writing a multiple-frame MNG. * Only use the first alpha channel in PSD image. * Only use XPM complying colors for XPM images (e.g. green is rgb(0,255,0)). * Eliminate bogus "invalid colormap index" when pinging ICO images. * Support -set density / units. * Properly map PNG intent to image->rendering_intent * The orient option sometimes improperly set "undefined" (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16795). * Only list orientation options for the -list orientation option (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16801). * Return proper standard deviation for combined channels (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16786). * Handle transparency properly for the PSD image format. * Emit a warning if the PNG encoder can't satisfy the color type and bit depth requested with a "-define" directive. * The -fx 2e+6/1e+5 argument no longer returns the wrong results (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=16833). * Add -subimage-search option to the compare utility. * Throw exception if image size differs for the compare program but the - subimage-search option is not specified.- update baselibs.conf- updated to 6.6.3-1: * obsoletes units.patch * obsoletes grayscale-tiff-jpeg.patch- fixed jpeg compression of grayscale tif format [bnc#615223]- Do not compile in build time but use mtime of changes file instead. This allows build-compare to identify that no changes have happened.- fixed units in the output [bnc#598714] * units.patch- update baselibs.conf- updated to version 6.6.1-0: * Fixed bug in equal-size tile cropping, when image has a page offset. * The -recolor 4x4 matrix is now interpretted properly (previously it summed rather attenuating the alpha channel). * Support writing 1-bit PSD images. * Support LCMS 2.0. * Improved WMF support under Windows. * The new coders/png.c was failing to read a 1-bit paletted image properly. * Finished eliminating the deprecated direct references to members of the png_info structure. ImageMagick can now be built with libpng-1.5. * Respect the -density option when rendering a Postscript or PDF image. * Distort barrel no longer complains when 3 arguments are given (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=15883). * Support -direction left-to-right option for rendering text * coders/png.c: Eliminated support of libpng versions older than 1.0.12. * Relocated the new, misplaced png_get_rowbytes() call. * Updated setjmp/longjmp/jmpbuf usage to work with libpng-1.5. * Add support for monochrome PSD images. * VignetteImage() no longer crashes when x and y arguments are both greater than half the width (x) and height (y) of the image. * Eliminated some of the deprecated direct references to members of the png_info structure. This must be finished before we can build with libpng-1.5. * The animate program no longer loops twice when -loop 1 is specified. * The caption format would sometimes hang when the text was not UTF-8. * Don't gamma correct log to linear color conversion unless the -gamma is specified (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=1&t=15799). * Detect CMYKProcessColor AI tag. * Delete image from command line cache for -write option. * Add support for the Adobe Large Document format. * Recognize -remap option for the mogrify utility. * The default Helvetica font is not always available, check for Century Schoolbook too (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=15780).- updated to version 6.6.0-5: * Permit user to get virtual pixels with a region width of 0. * Reformulate the jinc() functio so that the main peak is of amplitude of 1. * Resampling filter must respect the image virtual pixel method. * The -evaluate-sequence option behaves like -evaluate except it operates on a sequence of images. * Add support for the Adobe Large Document format. * Add support for the -maximum and -minimum options. * Check to see if ICON image width /height exceeds that of the image canvas. * Set the DPX descriptor to Luma only if the image type is not TrueColor. * Add support for -fx airy(), j0(), j1(), jinc(), and sinc() (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=15685). * Don't embed an XMP profile in an EPS image for now. * Insufficient image data in EPT is a warning rather than an error. * Respect -type TrueColor when writing gray DPX images. * Fix problem reading 10-bit grayscale DPX images when scanline length is not a multiple of 3. * BMP has an alpha channel, it was treated as an opacity channel. * Write 10-bit grayscale DPX images properly. * Detect PDF ICCBased colorspace. * Finalized -set option:convolve:scale kernel normalize/scale option * TransformImage() resets the image blob when called in the PICT decoder; use SetImageExtent() instead. * Support PSD RLE compression. * The jpeg:extent define sometimes exceeded the specified limit. * Resolve "too many open files" (reference http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=15546). * Added Correlate method which does a Convolve without reflecting the kernel. * Initialize grayscale colormap for PSD images. * Addition Third-level Subtractive Morphology Methods: EdgeIn, EdgeOut, Edge, TopHat, BottomHat * Ensuring original kernels passed to morphology are cloned before being modifified for use by specific methods (EG: convolve scale/normalize) * display -immutable to display transparent image without a checkboard. * Make -define png:color-type less persnickity about what it will accept. * added use of -precision in 'showkernel' output of -morphology * correct use of a 'reflected kernel' for 'Convolve' 'Dilate' and 'Distance' Morphology primatives. This does not have a performance hit, though is only truely applicable when the kernel is asymmetric. Note that 'Erode' does not use a 'reflected' kernel, so that 'Open' and 'Close' operations work properly. This 'reflected usage is defined by online morphology lecture notes (Google for "EECE Binary Morphology") * Added convolve kernel scaling setting "-set option:convolve:scale N" If undefined morphology convolve does not do any scaling or normalization of the convolution kernel. A value of 0.0 causes normalization for both zero and non-zero (added weights) kernel types. * Speed up reading the PSD image format. * Add the -precision option. Use it to set the maximum number of significant digits to be printed. * Add -features option to the identify program to display channel features. * Add -unique option to the identify program to display channel features. * Add support for compact floating point (i.e. -depth 16 -define quantum:format=floating-point). * Transparent images no longer flicker on certain system when using the display program. * Permit interactive resizing with the display program. * Support heterogeneous distributed processing, see http://www.imagemagick.org/script/architecture.php#distributed. * Fix semaphore assertion when reading a corrupt image with Magick++. * Add support for -brightness-contrast option. * Add support for the BGRA raw image format. * Added Kernel Generator to generate kernels from user strings, which allows the generation in many built in kernels for both Convolution and other Morphological methods. New Kernels currently include.. Convolution: Gaussian, Blur, Comet Morphological: Rectangle, Square, Diamond, Disk, Plus Distance: Chebyshev, Manhatten, Knight, Euclidean And both old and new (rectangular) user defined kernel specifications including the use of 'nan' to represent elements which are not part of the kernel definition. List built-in kernel types use "-list kernel" * Added -morphology {method}[:{iteration}] {kernel_string} Initial methods includes no only the basic morphology methods: Dilate, Erode, Open, Close; and a pixel color preserving 'Intensity' version, but also the special methods: Convolve, and Distance. Of course the appropriate kernel should be provided for each specific method. * Add OpenCL-enabled filter (e.g. convert image.png -process "convolve '-1, -1, -1, -1, 9, -1, -1, -1, -1'" image.jpg). * Added StringTo...() processing functions- don't remove *.la files, see [bnc#579798]- build -doc subpackage as noarch - spec cleanup- updated to 6.5.8-9, which fixes [bnc#565014]- package baselibs.conf- updated to 6.5.7-9 (See ChangeLog)- updated patches to apply with fuzz=0- splitted out doc package, see [bnc#533439]- updated to version 6.5.4-8 (See ChangeLog)- update baselibs.conf to complete previous change- updated to 6.5.3-2: * shared library version increased from 1 to 2 * subpackages renamed accordingly * includes a fix for bnc#507728build75 1561479023  !"#$%&'()*+,-.6.886.8.8.1-85.16.8.8.1-85.1 ImageMagickMagick.pmQ16.pmImageMagickMagick.bsMagick.soQ16Q16.bsQ16.soautosplit.ixautosplit.ixperl-PerlMagickLICENSEREADME.txtdemoGeneric.ttfMakefileREADMETurtle.pmannotate.plannotate_words.plbutton.plcompose-specials.plcomposite.pldemo.pldst.pnglsys.plmodel.gifpiddle.plpink-flower.gifpixel-fx.plred-flower.gifsettings.plshadow-text.plshapes.plsingle-pixels.plsmile.gifsrc.pngsteganography.pltile.giftree.plyellow-flower.gifImage::Magick.3pm.gzImage::Magick::Q16.3pm.gz/usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/Image//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/Image/Magick//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/auto//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/auto/Image//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/auto/Image/Magick//usr/lib/perl5/vendor_perl/5.18.2/x86_64-linux-thread-multi/auto/Image/Magick/Q16//usr/share/doc/packages//usr/share/doc/packages/perl-PerlMagick//usr/share/doc/packages/perl-PerlMagick/demo//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10525/openSUSE_Leap_42.3_Update/6d2e670831cfbe7c94178f92e22af84b-ImageMagick.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux   directoryPerl5 module source textemptyELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=881004f82913317c1a49c96c66d42f8b9b3ddf7e, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=0d7b82067ca70f3ffc28ee66bd9e39e881df1a96, strippedASCII textASCII text, with very long linesTrueType font datamakefile script, ASCII textPerl script, ASCII text executablePNG image data, 64 x 64, 16-bit/color RGBA, non-interlacedGIF image data, version 89a, 128 x 192GIF image data, version 89a, 12 x 12GIF image data, version 89a, 24 x 24GIF image data, version 89a, 48 x 48PNG image data, 50 x 50, 16-bit/color RGBA, non-interlacedGIF image data, version 89a, 71 x 71GIF image data, version 89a, 16 x 16troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) PPPR RRRRRRPR RRRRRRRRRRR>/hQnX?`]"k%< PvR)ǑT>."P>V4 u?½-:A\A) Bh IE?1-ǜ-Six,PtePgV[^^4,AB!7.ɥGvTSZmCi޿W|5ֺuA^5h jYqz:dmB[dhhfUgVQbݩ*  ';-,!=[뼝ubf0*%;ɽzַj{KK{զ0GM)q[0NzLpcwprKF'11!{)mwHi FAY-i\6qI$'/ X*mB͠|jv$,zz*>(L /XT2=5㷱>kSOo(n(^K#<~6'wDHr;l+#LGZl_Ŋ{GBX/ $'P\4QF=Z` &ć%UꖛFwAf5lQn-J 1C)? 횊98ZqPqV t0YC8kp>|Uߝ:9}^h/-1߮*8ѓa U:r[% B܍+x\xX&{)ɨ"ޏeFkF\ Oƥ嵿I ?a~m,ĦZs҂S0v@4: [ bWbV"$Nd\R/7E&wCVGGBs`{uYSn7~QwaHz%-*]+CTjZ4. t"\m*fV3e/H{Xߒ?'.2t0o|Ԕ|2(p2Nh!(J uk T.O I5bHct}/I4]K)uÞT쭣rGx I^z7*(L>punc]=*z5qRIznNj {f#xh'|:yXƶ6KMlItJ#8Yݡ*pW%b" ٩*)(PPF6h0&?е̒ TgT an nt"XQ>5EGч_7㊚IX(neThc&9QW6 y؛SMk0l-8@ܯ5I.k܋".VThgC㷷oKcP_nl*.*/_8X/quծny@?Ie(\p N}}MԬ ]Mg$-+,DC:+DX+ Q$*Gl[#/ɢu[fN~b[hvf<x2ꋚY?os-rO r32ZP\wl۸U-Ղ9B:ܦ%6]<ϕ ?sXJ^A)k%&OBΑ}c }K݌{n61nW= e^8nW/{=d=Hm6un/ފpB_L8^V ᛪ79 4_1jrH3ɸk=zӒC!Lzփr[k>[mv{-Y (Q;%%~T+#= #v5V@YgXMHGlM7"yI9@ڋٹK`Ёcݗgq-+-"cY 7SC%m.}0ck rz'E]@leR>G"(-.;olMwJ_}\qQkr^dQ흦{"j>h]PLSyF9iJ *6}>{;NUG˩.FX:;(tը%'ϧ6ye8- ҁKJspMe0um;N+rzķ u 8J(/\tl҄ﴘ^|9+[\9gLdMͫȵ T}0Y`{ SWnŤP>{oSD@_<ټ z!M/Ġmd/S#i-_ZB%mQnڲID /TN]x#}qyw;r6^V^*ٌ]uqSVH]l=pQx)?{Gւ؊ۣjI6gdJtEnZa"eX HcAY.RNײ `ðMKoaб1OCá웪; I!PmX60Et=OF` шO< NpJv\ 3^0'7OjN˒g"fh^y X&Γnk-iGXkGp}!f]DFBlD薥4$3ϻH:dWqX8 a6fI-(%d%H@s2ϥIK@`PV䊝thi^,p5puu[c;r9iz=Sݤ3F@ڠ^2UBJK^㕽0A&zƹF5CmNKR{,⚦lΟ 2ðx4 )>`n~9y[PǴ܌oBURx `$ې +*5bD[^}mEv'5*+^;H>u@zsJ^H {sX06ς$`,Uf"ڴ1ft<1"+bqq)KY`Н|w[u'u"Z֊/uySWrq%(',n70F@2{/83'B΢sMLf31 U7"FXD{`QmΕ;}`r79=\!cglak0fB Zg deEݔ.b/.+`dSR3cPagf/0Ag!,7 >|bk,/;mJO_{W8^vP_ V`JY@z֙νQy`<%[FXP-sQkds~ni#&KvD m)j cJz ⠦42iogj22dϔjܙDEo3o,8ԏA5Sx#)imU|OVp秡;X$Vp)3U ۹S%/;bv/Y4L3gܴux˘ =;ӡŶ}q'Va!3WUЀb;kJ䇠 u=P ;@ZH6~PP, ATTMmvd7Ԩ5Am σ\Q?5TV$ DQoἱ~&T8l*B=Yra/;i8C_X *pSIMVee{&pڣxUG.hHT XjѱrCqfP -ҁ*j '9PɞJ^ug=Tc;be dl_P$*'m,?/foԟLN!]ClNCv4&&3 bQ> ǧV_s .ɦ?qnYUWfm  h}rW2x9 G4=cnL|%?fB-? = : oäWC#y" Nj'Z nT@f#X\Dc+@°d4sH R=xIos>oo<j G*:;KD K8HfPc$C9Ϩ'd{5>9bR-Hf76 _dq+O{,jg;$$7Y]rB_cnCyo10cv\AIEQ42K=bj+ ~@*y2S殠:5yV?Ԡ^2w\8b#//nqi1!W$0j x&`7 hha2E Zb3I;gV*<[76 `M5(\r`elmɇr㸓sA(kVOaFĮgRaT9M(ÿLzń5_Ƕ/jޚ\Cme3{%Mx qpxcРFo=dv{ތ[!l΁{֌J pAHZм2k8N](9ƑzEf$` E#Z5qYИQ?F>6#"')/[LRI-9͍|tn}a q4gwՄV= Zl駍P J:tvc5Bq +qs7E:+)a(Ɣ)WBAwN_,t"iʅC#WꢖUNwvGi_R;G,ezխdm oW|^{.A{j% ُ)3DqnI 4Refq0äqfȪyg`>Iųlb {Q9p/ WPߏ`37Q^!/E7Q+hCnו\<U^lb=Dg_#(9)r*E MCy=UEn[ʉ%qBU,߳Buߢˎ!U|㿿L^rW"1_"םN yep[NXFqtd cvʳ'&.}CmdcaQ(nb9\w6h\92>0yX"ƕXlGҘ=]Ջh珠Mfԫ gŰ5_-D~p?Πe[Ă3ͣQ}VF8xkĝ[z%+w9igOgo0h: 3v/Rax,Ǩrڳb6rI~fVЩ{=&4#QJnV. X wX\] =L c:w*C`% =3XY:NT&aNnkQhʋ | VbmVi3D vuٍw6EƉnSwҸEbNBSv[SOUū=خa)IwHB'U6ZK@{ 3NdZ3݆+.͟YBkl2Cs}4r~Jbm9!H\7.43̛}pm$T9#=BE|d gi9SY16[<trd xr:^ j/b~ԫ*&GhK߶JGIEE'\A֊&\QyAEԚ[д>zb/^D"F`x\ya_+?N~D oO$ye)|u#muDzE4ߺ9ywY6+M X;d#r2z.pe$;fTJuo.Pۍ6>}َYxBwm9:ܑty/ #Yk޺F @R#pf< b[&jm2;~SЮQFfz#Jpz>T%9UF$‡9?YֲկGXpQI\I pRtk L!6!9'YT'X7k{ \i|CT\{U__SCtծ->u"χZ3WV`Re}ӏZp(kbSq.Z8KsX`ݬ|T'!j2 !i =cJOy?cgGsF.K.~mgyH \AF>j,Uc`3h޸V^W.x~dzdw:‘0rG]d٦p, J@ՃAFZ8 DdD[TEurN3';@_mдXIWÈdmxwB*;XkOclY]pJ!lkI&Gsۜc-ݤBGvuڣV_)rR@_m7pJXd "d62$[s/Dpy2҅\E.jb nQv3}vK(>uFa (,ʷaU[LR'mke;,@nSeuV,}tyB +=NGݕiT mߢ:ޫ?Qe^Q;?l'5ԋ3ڍcPlߩO7/.{@^.N;=8u%0hj u{9o+pn ۥ]d$䫖8SMO9ဎF rnBr3Haf R^-Bk;Vᨘa!nv궫W+޾[66<ݟ\P{=gp >&+"y+l>iwX{|=D'|kB]Yba?ATdwSAz}(D=F i_},C6P?=Qݾb6 0o"9X4 jd"&¶iWΨyX* /O5rƩ,I9ds׶KQBSתs J:!Q |E6cVSj%Dd&sn0\PµO1XYmh\V("[VJ~ĝn$sQG&84a^$ZA&1>Zm* f:l' C*߿T78Zwi 3RR4BE(c2ȏzY3k#㈃ j6E3iKLs't6IBG[4 cuKjT1d4PdrrUaA uv=9bSm# #;(xGRn<< 6vF׎%'2"^.pMjv5D}"G5qo8OWd_Döa y {t fNj0U5-QG)邱!;eYv<Ex$6y# dk*yYͳdֶ(2WWۜ]8;YJ;U"n[~Ozd|dh@<ۄ%.c.$I^`a3HGr]}9~욱uշ|mvm'.E9X[L} H1Ce%-:z/Og:cm)f"jk =֫Dw3O8mTko,vœ>PQ|oR鍲DxW@p9ˌP SȜGĿ"p8yFYR^QDolNvA٭^VNk/+jYb1n%iь 4k!3A;^M0kO%=K޹Va>"h -:'p,pIjQ`0v no!gxe̅jJ|ZuĖ:DWߪ٨hتcs]6kZ+FkP觗oUdUfSbOT۩tyU?[or|4G$\XZ+C|N~&J;A}9&YmX, V&,ݜB}ķ5hx53T1({ޏ^ݡ,6Ǘ,-|_c@4̑a M`b3VOa,gowwPG󼃶ȸKH!r#(̌ț/rB1LV"A (c_ӓ+] XEB/ԳGr}ڑEs&ރUX-'Q0werQ2 -GSsxՠ!gρ=y H11|آfdjh^g)gƑrAۉt}ع6(<~"&WwAy Y9Z)%+ᵌ)nlBrA0H4vMí'b-`ʄYdQu=3S2 EC&Cߓ<2h ~ V,>&Uunu=+; 蠙QL [z|ޝ0RVҞ-ċM${(ѰX=3GBj3ŊKJ2ۚEC\uO@z L7MIJ) ֘@"jԓ~`>_Ol=t𢦷]ͥpVFy`zm5/Pg*dpjiZ Z&C3&yn2~7r #L/dQiݛ<~cŹEBiFX9K? y|u>4hA%:a4Oej4 (`m8Kj\L(wOLB 9)swW,nze|)vEF>,}/[+4pġxx[%ip(k]p`vMs:P6=aƾOKALJ^wU49(@!NćǁEH|G#mfXJ\9/r:jryiU^zQ%")fL5? ?0~@_E}* ن6ă@ãߞ1|5gb3("ޓXҧ}lub z*-GA,'5x@lR3\ҷ9?%z 5jxyM#4H5@@!ͣ&dr_dpid'opLփLϢ;gY-yPXx p5 p p0~T;JeXC(»!տnQx0( )T @7`l4N5C^^Я!BZ]mZˌ/3&x$ӻ8HuP?g?>0[ȌWD礫,Ԅi.R}PSo ȊZ]8^!:OjʣsK<$QЂ>8,7'Kٴ(sĄE q:^/ޣBAGXfݴ [68!}( 2 p6,rsS0s}ml ;c}@MkXH XD qs5ة7qƿ` dd`VsJK!X$IۭR/XTV%"H}^MN1 ~sOHYG-!b9% NRcAlu(F­1Cӡ|TZ=,sVo@2jhh%\^sksL]yT=l(`τ?+ŵBSpW_#+M`ǎ2vw$Qh.(ݚhfyCe&M:h}6x*gu{%F2$4sʌ1 6E%~?x82Hi/2b ]Pac; JHqg@Q6TAP^UW??XtSv-c$xP7k̢uXllN<[G0MA"L^9p,X!e,+Ƒ؞ic7 z}WP -X/xe1O©СΥu5+Y66'ڨ|Lkq83[Ƕݙg5GKm u3j#ljJr?mc7S `<%@g-r#-.оé@}`N zzj[޽OIJ܅5yz4cc{n