Группа :: Графика
Исходный пакет: ImageMagick
Собрано: больше 4 лет назад
Размер архива: 8,0 МБ
Отчёт repocop:

Gear: http://git.altlinux.org/gears/I/ImageMagick.git
Архив: http://ftp.altlinux.org/pub/distributions/archive/p7/index/src/I/ImageMagick
Домашняя страница: http://www.imagemagick.org/
Лицензия: OpenSource
О пакете: An X application for displaying and manipulating images
Описание:
ImageMagick is a powerful image display, conversion and manipulation tool.
It runs in an X session. With this tool, you can view, edit and display
a variety of image formats.
This package installs the necessary files to run ImageMagick.
Текущий сопровождающий:
Антон Фарыгин
Список участников
(данной и/или предыдущих сборок пакета):
- Алексей Новодворский
- ALT QA Team Robot
- Алексей Турбин
- Андрей Черепанов
- Антон Фарыгин
- Bernhard Rosenkraenzer
- Bill Nottingham
- Chmouel Boudjnah
- Cristian Gafton
- David BAUDENS
- Дмитрий Левин
- Donnie Barnes
- Erik Troan
- Евгений Ростовцев
- Frederic Lepied
- Geoffrey Lee
- Георгий Курячий
- Giuseppe Ghibò
- Konstantin Volckov
- Michael Fulbright
- Michael K. Johnson
- Pixel
- Prospector System
- Stanislav Ievlev
- Stefan Siegel
- Stefan van der Eijk
- Thierry Vignaud
- Валерий Иноземцев
- Vincent Saugey
- Владимир Леттиев
- Юрий Седунов
- ImageMagick
- ImageMagick-doc
- ImageMagick-tools
- ImageMagick-tools-debuginfo
- libImageMagick
- libImageMagick-debuginfo
- libImageMagick-devel
- perl-Magick
- perl-Magick-debuginfo
- Apply security patch from Debian: Disable support for reading input from a shell command, or writing output to a shell command. This was done by the pipe (|) prefix. It was possible to perform a command injection as discrived by CVE-2016-5118 since it use popen.2016-05-18 Андрей Черепанов 6.8.4.10-alt3.M70P.1
- Apply security patches from Debian: ImageTragick: The coders EPHEMERAL, URL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT are disabled via policy.xml file, since they are vulnerable to code injection. This mitigates CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, and CVE-2016-3718. Since ImageMagick reverts to its internal SVG renderer (which uses MVG coder) if Inkscape or RSVG is not used, the option --with-rsvg is included. Closes: 823542. In addition, some other actions were taken with respect to these vulnerabilities: - Drop the PLT/Gnuplot decoder, which was vulnerable to command injection. - Some sanitization for input filenames in http/https delegates is added. - Indirect filename are now authorized by policy. - Indirect reads with label:@ are prevented. - Less secure coders (such as MVG, TEXT, and MSL) require explicit reference in the filename (e.g. mvg:my-graph.mvg).2013-04-25 Георгий Курячий 6.8.4.10-alt2.1
- Avoid ImageMagick pipe i/o bug