Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: transfig | Distribution: openSUSE Tumbleweed |
Version: 3.2.9 | Vendor: openSUSE |
Release: 4.1 | Build date: Thu Sep 12 14:00:53 2024 |
Group: Productivity/Graphics/Convertors | Build host: reproducible |
Size: 1522528 | Source RPM: transfig-3.2.9-4.1.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://mcj.sourceforge.net/ | |
Summary: Graphic Converter |
TransFig is a set of tools for creating TeX documents with graphics that are portable in the sense that they can be printed in a wide variety of environments. The transfig directory contains the source for the transfig command which generates a Makefile which translates Fig code to various graphics description languages using the fig2dev program. In previous releases, this command was implemented as a shell script.
MIT
* Thu Sep 12 2024 Dr. Werner Fink <werner@suse.de> - Add patch transfig-gs10.03.patch * Avoid warnings about ignored WriteObjStms and WriteXRefStm directives with PDF 1.4 (boo#1230427) * Tue Jul 02 2024 Dr. Werner Fink <werner@suse.de> - Add patch transfig-gcc14.patch * Fix the last missing declaration of put_msg() (boo#1225947 * Mon Feb 26 2024 pgajdos@suse.com - Use %patch -P N instead of deprecated %patchN * Fri Sep 15 2023 Dr. Werner Fink <werner@suse.de> - Update to fig2dev version 3.2.9 (Aug 2023) o Write utf8-encoded postscript and tex-outputs. Ticket numbers refer to https://sourceforge.net/p/mcj/tickets/#. o Include sys/wait.h to build on some bsds. o Process crafted input files, tickets #142, #145, #146, #147, #148, and #152. o Correctly scale dxf output, ticket #91. o Correct a typo causing incorrect eps import, ticket #137. o Regression, pass driver names to driver, ticket #139. - Port and rename patch transfig-3.2.8.dif which is now transfig-3.2.9.dif - Port patches * fig2dev-3.2.6-fig2mpdf.patch * transfig-fix-afl.patch - Remove patches now upstream * 0001-Make-ModDate-and-CreationDate-in-PDF-reproducible.patch * 1b09a8.patch * Sat Mar 18 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de> - Drop obsolete fig2dev-3.2.6a-RGBFILE.patch. - Set correct path for X11 rgb.txt file (no longer in /etc), recommend rgb package. - Fix typo for enable-scale-pict2e option. - Remove obsolsete hunks from transfig-3.2.8.dif, rebase fig2dev-3.2.6-fig2mpdf.patch. - Avoid epstopdf dependency, add 0001-Use-native-fig2dev-pdf-output-instead-of-epstopdf.patch This also fixes unreproducible figures created by fig2mpdf. - Fix CFLAGS checks, -Wformat-security requires -Wformat. * Thu Mar 09 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de> - Make PDF output via ghostscript (for large parts) reproducible, add 0001-Make-ModDate-and-CreationDate-in-PDF-reproducible.patch * Thu Mar 09 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de> - Fix fig2mpdf documentation: * rerun latex to get references right. * uudecode images for html documentation. - Clean up spec file, remove parts for EOLed SLE 11. - Depend on texlive-epstopdf only if texlive is installed. - Use weak dependency on ghostscript, vector output formats like EPS, PS and SVG do not depend on it. * Wed Oct 06 2021 Dr. Werner Fink <werner@suse.de> - Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021) o Detect the output language from the output file name. o On the command line, a minus (-) as input or output file name refers to standard input or standard output. o Correct buffer overflows and segfaults, mainly due to maliciously crafted input files, tickets #113-117, #122, #123, #125-#135. o With -Lepic -P, generate a complete tex file. o Correctly produce a gif if a transparent color is given, ticket #121. o Return with error if no space is left on the device. Ticket #101. - Remove patch 6827c09d.patch now upstream - Add patch 1b09a8.patch from upstream (for ticket #137) - Port patch fig2dev-3.2.6-fig2mpdf.patch back - This Update includes the fixes for * bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c. * bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c. * bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c. * bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c. * bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c. * bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c. * bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c. * bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c * Mon Aug 16 2021 Dr. Werner Fink <werner@suse.de> - Skip requirement of texlive-epstopdf as SLE-12 does not have that * Wed Aug 11 2021 Dr. Werner Fink <werner@suse.de> - Skip build of documentation of fig2mpdf on SLE-12 * Fri Jun 18 2021 Dr. Werner Fink <werner@suse.de> - Make spec file build with older SLE versions as well * This version is used by xfig 3.2.8 and above * Fri May 21 2021 Dr. Werner Fink <werner@suse.de> - Add upstream commit as patch 6827c09d.patch Global buffer overflow in fig2dev/read.c in function read_colordef() (boo#1186329, CVE-2021-3561) * Thu Apr 01 2021 Dr. Werner Fink <werner@suse.de> - Update to fig2dev version 3.2.8 Patchlevel 8a (Mar 2021) o Allow closed splines with three points. o Fix build under Darwin. - Correct hunk offsets of the patch o transfig-3.2.8.dif * Fri Feb 12 2021 Dr. Werner Fink <werner@suse.de> - Update to fig2dev version 3.2.8 (Patchlevel 8 (Dec 2020) o Use deflate to embed image data into eps output, often substantially reducing file size. o Embed pdf files into ps output by converting the pdf to eps. o Allow negative arrow widths. This might be useful for asymmetric arrow tips, which can thus be mirrored around the corresponding line. Ticket numbers refer to https://sourceforge.net/p/mcj/tickets/#. o Reject negative text font sizes. Fixes ticket #86. o Allow fig files ending without previous eol character. Fixes #83, #84. o Accept text and ellipse angles only within -2*pi to 2*pi. Fixes #76. o Allow -1 as default TeX font, not only 0. Fixes #71, #75, #81. o Do not allow ASCII NUL anywhere in input. Fixes #65, #68, #73, #80. o Use getline() to improve input scanning. Fixes tickets #58, #59, #61, #62, #67, #78, #79, #82. o Correctly scan embedded pdfs for /MediaBox value. o Convert polygons having too few points to polylines. Ticket #56. o Reject huge arrow types causing integer overflow. Ticket #57. o Allow Fig v2 text strings ending with multiple ^A. Ticket #55. o Embed images in pdfs with their original compression type, i.e., leave the gs switch "-dAutoFilterColorImages" at its default value "true". - This update includes the fixes for bsc#1159293 - CVE-2019-19797: transfig,xfig: out-of-bounds write in read_colordef in read.c bsc#1161698 - CVE-2019-19555: transfig,xfig: stack-based buffer overflow because of an incorrect sscanf bsc#1159130 - CVE-2019-19746: transfig,xfig: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type bsc#1189343 - CVE-2020-21680: transfig: A stack-based buffer overflow in the put_arrow() component in genpict2e.c bsc#1189345 - CVE-2020-21681: transfig: A global buffer overflow in the set_color component in genge.c bsc#1189325 - CVE-2020-21683: transfig: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c bsc#1189346 - CVE-2020-21682: transfig: A global buffer overflow in the set_fill component in genge.c and many more - Port and rename patch transfig-3.2.6.dif which is now transfig-3.2.8.dif - Remove patches now obsolete * 00cded.patch * 100e27.patch * 2f8d1a.patch * 3065eb.patch * 3165d8.patch * 421afa.patch * 4d4e1f.patch * 639c36.patch * CVE-2019-19555.patch * CVE-2019-19746.patch * CVE-2019-19797.patch * acccc8.patch * c379fe.patch * ca48cc.patch * d6a10d.patch * d70e4b.patch * e3cee2.patch * transfig.3.2.5-binderman.dif * transfig.3.2.5d-mediaboxrealnb.dif - Port patches * fig2dev-3.2.6-fig2mpdf.patch * fig2dev-3.2.6a-RGBFILE.patch
/usr/bin/fig2dev /usr/bin/fig2mpdf /usr/bin/fig2ps2tex /usr/bin/pic2tpic /usr/bin/transfig /usr/share/doc/packages/transfig /usr/share/doc/packages/transfig/CHANGES /usr/share/doc/packages/transfig/NOTES /usr/share/doc/packages/transfig/README /usr/share/doc/packages/transfig/fig2mpdf /usr/share/doc/packages/transfig/fig2mpdf/Makefile /usr/share/doc/packages/transfig/fig2mpdf/XFig-LaTeX-together.jpg /usr/share/doc/packages/transfig/fig2mpdf/XFig-LaTeX.jpg /usr/share/doc/packages/transfig/fig2mpdf/anim-presentation.gif /usr/share/doc/packages/transfig/fig2mpdf/fig2dev-pdftex_p.html /usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf-output.gif /usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf.css /usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf.html /usr/share/doc/packages/transfig/fig2mpdf/fig2ps-output.gif /usr/share/doc/packages/transfig/fig2mpdf/index.html /usr/share/doc/packages/transfig/fig2mpdf/overlay-sample.jpg /usr/share/doc/packages/transfig/fig2mpdf/overlay-sample.lfig /usr/share/doc/packages/transfig/fig2mpdf/overlaying.gif /usr/share/doc/packages/transfig/fig2mpdf/sample-flat.jpg /usr/share/doc/packages/transfig/fig2mpdf/sample-flat.pdf /usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.gif /usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.pdf /usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.tex /usr/share/doc/packages/transfig/transfig.pdf /usr/share/fig2dev /usr/share/fig2dev/i18n /usr/share/fig2dev/i18n/ja.ps /usr/share/fig2dev/i18n/ja_JP.EUC.ps /usr/share/fig2dev/i18n/ja_JP.eucJP.ps /usr/share/fig2dev/i18n/ja_JP.ps /usr/share/fig2dev/i18n/ja_JP.ujis.ps /usr/share/fig2dev/i18n/japanese.ps /usr/share/fig2dev/i18n/ko.ps /usr/share/fig2dev/i18n/ko_KR.EUC.ps /usr/share/fig2dev/i18n/ko_KR.eucKR.ps /usr/share/fig2dev/i18n/ko_KR.ps /usr/share/fig2dev/i18n/korean.ps /usr/share/man/man1/fig2dev.1.gz /usr/share/man/man1/fig2mpdf.1.gz /usr/share/man/man1/fig2ps2tex.1.gz /usr/share/man/man1/pic2tpic.1.gz /usr/share/man/man1/transfig.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Oct 18 00:12:25 2024