Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

transfig-3.2.9-1.1 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: transfig Distribution: openSUSE:Factory:zSystems
Version: 3.2.9 Vendor: openSUSE
Release: 1.1 Build date: Sun Sep 24 16:11:37 2023
Group: Productivity/Graphics/Convertors Build host: s390zl2a
Size: 1302096 Source RPM: transfig-3.2.9-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://mcj.sourceforge.net/
Summary: Graphic Converter
TransFig is a set of tools for creating TeX documents with graphics
that are portable in the sense that they can be printed in a wide
variety of environments.

The transfig directory contains the source for the transfig command
which generates a Makefile which translates Fig code to various
graphics description languages using the fig2dev program.  In previous
releases, this command was implemented as a shell script.

Provides

Requires

License

MIT

Changelog

* Fri Sep 15 2023 Dr. Werner Fink <werner@suse.de>
  - Update to fig2dev version 3.2.9 (Aug 2023)
    o Write utf8-encoded postscript and tex-outputs.
      Ticket numbers refer to https://sourceforge.net/p/mcj/tickets/#.
    o Include sys/wait.h to build on some bsds.
    o Process crafted input files, tickets #142, #145, #146, #147, #148,
      and #152.
    o Correctly scale dxf output, ticket #91.
    o Correct a typo causing incorrect eps import, ticket #137.
    o Regression, pass driver names to driver, ticket #139.
  - Port and rename patch transfig-3.2.8.dif which is now transfig-3.2.9.dif
  - Port patches
    * fig2dev-3.2.6-fig2mpdf.patch
    * transfig-fix-afl.patch
  - Remove patches now upstream
    * 0001-Make-ModDate-and-CreationDate-in-PDF-reproducible.patch
    * 1b09a8.patch
* Sat Mar 18 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de>
  - Drop obsolete fig2dev-3.2.6a-RGBFILE.patch.
  - Set correct path for X11 rgb.txt file (no longer in /etc),
    recommend rgb package.
  - Fix typo for enable-scale-pict2e option.
  - Remove obsolsete hunks from transfig-3.2.8.dif,
    rebase fig2dev-3.2.6-fig2mpdf.patch.
  - Avoid epstopdf dependency, add
    0001-Use-native-fig2dev-pdf-output-instead-of-epstopdf.patch
    This also fixes unreproducible figures created by fig2mpdf.
  - Fix CFLAGS checks, -Wformat-security requires -Wformat.
* Thu Mar 09 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de>
  - Make PDF output via ghostscript (for large parts) reproducible,
    add 0001-Make-ModDate-and-CreationDate-in-PDF-reproducible.patch
* Thu Mar 09 2023 Stefan Brüns <stefan.bruens@rwth-aachen.de>
  - Fix fig2mpdf documentation:
    * rerun latex to get references right.
    * uudecode images for html documentation.
  - Clean up spec file, remove parts for EOLed SLE 11.
  - Depend on texlive-epstopdf only if texlive is installed.
  - Use weak dependency on ghostscript, vector output formats
    like EPS, PS and SVG do not depend on it.
* Wed Oct 06 2021 Dr. Werner Fink <werner@suse.de>
  - Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)
    o Detect the output language from the output file name.
    o On the command line, a minus (-) as input or output file name refers
      to standard input or standard output.
    o Correct buffer overflows and segfaults, mainly due to maliciously
      crafted input files, tickets #113-117, #122, #123, #125-#135.
    o With -Lepic -P, generate a complete tex file.
    o Correctly produce a gif if a transparent color is given, ticket #121.
    o Return with error if no space is left on the device. Ticket #101.
  - Remove patch 6827c09d.patch now upstream
  - Add patch 1b09a8.patch from upstream (for ticket #137)
  - Port patch fig2dev-3.2.6-fig2mpdf.patch back
  - This Update includes the fixes for
    * bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
    * bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
    * bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
    * bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
    * bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
    * bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
    * bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
    * bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
* Mon Aug 16 2021 Dr. Werner Fink <werner@suse.de>
  - Skip requirement of texlive-epstopdf as SLE-12 does not have that
* Wed Aug 11 2021 Dr. Werner Fink <werner@suse.de>
  - Skip build of documentation of fig2mpdf on SLE-12
* Fri Jun 18 2021 Dr. Werner Fink <werner@suse.de>
  - Make spec file build with older SLE versions as well
    * This version is used by xfig 3.2.8 and above
* Fri May 21 2021 Dr. Werner Fink <werner@suse.de>
  - Add upstream commit as patch 6827c09d.patch
    Global buffer overflow in fig2dev/read.c in function read_colordef()
    (boo#1186329, CVE-2021-3561)
* Thu Apr 01 2021 Dr. Werner Fink <werner@suse.de>
  - Update to fig2dev version 3.2.8 Patchlevel 8a (Mar 2021)
    o Allow closed splines with three points.
    o Fix build under Darwin.
  - Correct hunk offsets of the patch
    o transfig-3.2.8.dif
* Fri Feb 12 2021 Dr. Werner Fink <werner@suse.de>
  - Update to fig2dev version 3.2.8 (Patchlevel 8 (Dec 2020)
    o Use deflate to embed image data into eps output, often substantially
      reducing file size.
    o Embed pdf files into ps output by converting the pdf to eps.
    o Allow negative arrow widths. This might be useful for asymmetric arrow
      tips, which can thus be mirrored around the corresponding line.
    Ticket numbers refer to https://sourceforge.net/p/mcj/tickets/#.
    o Reject negative text font sizes. Fixes ticket #86.
    o Allow fig files ending without previous eol character. Fixes #83, #84.
    o Accept text and ellipse angles only within -2*pi to 2*pi. Fixes #76.
    o Allow -1 as default TeX font, not only 0. Fixes #71, #75, #81.
    o Do not allow ASCII NUL anywhere in input. Fixes #65, #68, #73, #80.
    o Use getline() to improve input scanning.
      Fixes tickets #58, #59, #61, #62, #67, #78, #79, #82.
    o Correctly scan embedded pdfs for /MediaBox value.
    o Convert polygons having too few points to polylines. Ticket #56.
    o Reject huge arrow types causing integer overflow. Ticket #57.
    o Allow Fig v2 text strings ending with multiple ^A. Ticket #55.
    o Embed images in pdfs with their original compression type, i.e., leave
      the gs switch "-dAutoFilterColorImages" at its default value "true".
  - This update includes the fixes for
    bsc#1159293 - CVE-2019-19797: transfig,xfig: out-of-bounds write in
      read_colordef in read.c
    bsc#1161698 - CVE-2019-19555: transfig,xfig: stack-based buffer
      overflow because of an incorrect sscanf
    bsc#1159130 - CVE-2019-19746: transfig,xfig: segmentation fault and
      out-of-bounds write because of an integer overflow via
      a large arrow type
    bsc#1189343 - CVE-2020-21680: transfig: A stack-based buffer overflow in the
      put_arrow() component in genpict2e.c
    bsc#1189345 - CVE-2020-21681: transfig: A global buffer overflow in the
      set_color component in genge.c
    bsc#1189325 - CVE-2020-21683: transfig: A global buffer overflow in the
      shade_or_tint_name_after_declare_color in genpstricks.c
    bsc#1189346 - CVE-2020-21682: transfig: A global buffer overflow in the
      set_fill component in genge.c
    and many more
  - Port and rename patch transfig-3.2.6.dif which is now transfig-3.2.8.dif
  - Remove patches now obsolete
    * 00cded.patch
    * 100e27.patch
    * 2f8d1a.patch
    * 3065eb.patch
    * 3165d8.patch
    * 421afa.patch
    * 4d4e1f.patch
    * 639c36.patch
    * CVE-2019-19555.patch
    * CVE-2019-19746.patch
    * CVE-2019-19797.patch
    * acccc8.patch
    * c379fe.patch
    * ca48cc.patch
    * d6a10d.patch
    * d70e4b.patch
    * e3cee2.patch
    * transfig.3.2.5-binderman.dif
    * transfig.3.2.5d-mediaboxrealnb.dif
  - Port patches
    * fig2dev-3.2.6-fig2mpdf.patch
    * fig2dev-3.2.6a-RGBFILE.patch
* Wed Sep 30 2020 Dr. Werner Fink <werner@suse.de>
  - Add upstream security patches/commits
    * 100e27.patch
    * 3065eb.patch
    * ca48cc.patch
* Tue Sep 29 2020 Dr. Werner Fink <werner@suse.de>
  - Do hardening via compile and linker flags
* Tue Feb 11 2020 Dr. Werner Fink <werner@suse.de>
  - Add upstream security patches/commits
    * 00cded.patch
    * 2f8d1a.patch
    * 3165d8.patch
    * 421afa.patch
    * 4d4e1f.patch
    * 639c36.patch
    * acccc8.patch
    * d6a10d.patch
    * d70e4b.patch
    * e3cee2.patch
* Tue Jan 21 2020 Dr. Werner Fink <werner@suse.de>
  - Avoid auto(re)config
* Tue Jan 21 2020 Dr. Werner Fink <werner@suse.de>
  - Add security patches
    * CVE-2019-19746.patch -- bsc#1159130
    * c379fe.patch ... currently without CVE and bugzilla entry
    * CVE-2019-19797.patch -- bsc#1159293

Files

/usr/bin/fig2dev
/usr/bin/fig2mpdf
/usr/bin/fig2ps2tex
/usr/bin/pic2tpic
/usr/bin/transfig
/usr/share/doc/packages/transfig
/usr/share/doc/packages/transfig/CHANGES
/usr/share/doc/packages/transfig/NOTES
/usr/share/doc/packages/transfig/README
/usr/share/doc/packages/transfig/fig2mpdf
/usr/share/doc/packages/transfig/fig2mpdf/Makefile
/usr/share/doc/packages/transfig/fig2mpdf/XFig-LaTeX-together.jpg
/usr/share/doc/packages/transfig/fig2mpdf/XFig-LaTeX.jpg
/usr/share/doc/packages/transfig/fig2mpdf/anim-presentation.gif
/usr/share/doc/packages/transfig/fig2mpdf/fig2dev-pdftex_p.html
/usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf-output.gif
/usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf.css
/usr/share/doc/packages/transfig/fig2mpdf/fig2mpdf.html
/usr/share/doc/packages/transfig/fig2mpdf/fig2ps-output.gif
/usr/share/doc/packages/transfig/fig2mpdf/index.html
/usr/share/doc/packages/transfig/fig2mpdf/overlay-sample.jpg
/usr/share/doc/packages/transfig/fig2mpdf/overlay-sample.lfig
/usr/share/doc/packages/transfig/fig2mpdf/overlaying.gif
/usr/share/doc/packages/transfig/fig2mpdf/sample-flat.jpg
/usr/share/doc/packages/transfig/fig2mpdf/sample-flat.pdf
/usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.gif
/usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.pdf
/usr/share/doc/packages/transfig/fig2mpdf/sample-presentation.tex
/usr/share/doc/packages/transfig/transfig.pdf
/usr/share/fig2dev
/usr/share/fig2dev/i18n
/usr/share/fig2dev/i18n/ja.ps
/usr/share/fig2dev/i18n/ja_JP.EUC.ps
/usr/share/fig2dev/i18n/ja_JP.eucJP.ps
/usr/share/fig2dev/i18n/ja_JP.ps
/usr/share/fig2dev/i18n/ja_JP.ujis.ps
/usr/share/fig2dev/i18n/japanese.ps
/usr/share/fig2dev/i18n/ko.ps
/usr/share/fig2dev/i18n/ko_KR.EUC.ps
/usr/share/fig2dev/i18n/ko_KR.eucKR.ps
/usr/share/fig2dev/i18n/ko_KR.ps
/usr/share/fig2dev/i18n/korean.ps
/usr/share/man/man1/fig2dev.1.gz
/usr/share/man/man1/fig2mpdf.1.gz
/usr/share/man/man1/fig2ps2tex.1.gz
/usr/share/man/man1/pic2tpic.1.gz
/usr/share/man/man1/transfig.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 12:50:11 2024