Change log for openjpeg2 package in Ubuntu
1 → 42 of 42 results | First • Previous • Next • Last |
Published in oracular-release |
Published in noble-release |
Deleted in noble-proposed (Reason: Moved to noble) |
openjpeg2 (2.5.0-2build3) noble; urgency=medium * No-change rebuild for CVE-2024-3094 -- Steve Langasek <email address hidden> Sun, 31 Mar 2024 06:41:24 +0000
Available diffs
- diff from 2.5.0-2build2 to 2.5.0-2build3 (314 bytes)
openjpeg2 (2.5.0-2build2) noble; urgency=medium * No-change rebuild against libcurl3t64-gnutls -- Steve Langasek <email address hidden> Sat, 16 Mar 2024 07:14:29 +0000
Available diffs
- diff from 2.5.0-2 (in Debian) to 2.5.0-2build2 (594 bytes)
- diff from 2.5.0-2build1 to 2.5.0-2build2 (309 bytes)
Superseded in noble-proposed |
openjpeg2 (2.5.0-2build1) noble; urgency=medium * No-change rebuild against libpng16-16t64 -- Steve Langasek <email address hidden> Thu, 29 Feb 2024 07:40:22 +0000
Available diffs
- diff from 2.5.0-2 (in Debian) to 2.5.0-2build1 (551 bytes)
Deleted in noble-updates (Reason: superseded by release) |
Superseded in noble-release |
Published in mantic-release |
Deleted in mantic-proposed (Reason: Moved to mantic) |
openjpeg2 (2.5.0-2) unstable; urgency=medium * Team upload. * Fix broken symlink, actually install jar. Closes: #1036584 -- Andreas Metzler <email address hidden> Fri, 26 May 2023 12:16:24 +0200
Available diffs
- diff from 2.5.0-1build1 (in Ubuntu) to 2.5.0-2 (685 bytes)
openjpeg2 (2.3.0-2+deb10u2build0.18.04.1) bionic-security; urgency=medium * fake sync from Debian -- Amir Naseredini <email address hidden> Fri, 10 Mar 2023 17:03:30 +0000
Available diffs
Superseded in mantic-release |
Published in lunar-release |
Deleted in lunar-proposed (Reason: Moved to lunar) |
openjpeg2 (2.5.0-1build1) lunar; urgency=medium * Rebuild against latest tiff -- Jeremy Bicha <email address hidden> Sat, 04 Feb 2023 11:07:13 -0500
Available diffs
- diff from 2.5.0-1 (in Debian) to 2.5.0-1build1 (309 bytes)
Superseded in lunar-release |
Obsolete in kinetic-release |
Deleted in kinetic-proposed (Reason: Moved to kinetic) |
openjpeg2 (2.5.0-1) unstable; urgency=medium * New upstream version 2.5.0 * d/control: Upstream has removed JP3D support * d/patches: Refresh patches (removed those applied upstream) * d/rules: Update rules to 2.5 location * d/control: Update Std-Vers to 4.6.1 no changes needed -- Mathieu Malaterre <email address hidden> Mon, 20 Jun 2022 16:05:24 +0200
Available diffs
- diff from 2.4.0-6 to 2.5.0-1 (469.9 KiB)
Superseded in kinetic-release |
Published in jammy-release |
Deleted in jammy-proposed (Reason: Moved to jammy) |
openjpeg2 (2.4.0-6) unstable; urgency=medium * d/copyright: Remove lintian error duplicate-globbing-patterns * d/rules: Do not install *.so symlinks for jp3d/jpip. Closes: #1003807 -- Mathieu Malaterre <email address hidden> Mon, 17 Jan 2022 08:07:17 +0100
Available diffs
- diff from 2.3.1-1ubuntu5 (in Ubuntu) to 2.4.0-6 (94.7 KiB)
- diff from 2.4.0-5 to 2.4.0-6 (811 bytes)
openjpeg2 (2.4.0-5) unstable; urgency=medium * d/patches: Make sure to always install manpages * d/control: Incoporate suggestion from Multiarch hinter -- Mathieu Malaterre <email address hidden> Fri, 14 Jan 2022 16:18:56 +0100
Available diffs
- diff from 2.4.0-3 to 2.4.0-5 (3.1 KiB)
Superseded in jammy-release |
Deleted in jammy-proposed (Reason: Moved to jammy) |
Deleted in impish-proposed (Reason: Moved to jammy) |
openjpeg2 (2.3.1-1ubuntu6) impish; urgency=medium * No-change rebuild to build packages with zstd compression. -- Matthias Klose <email address hidden> Thu, 07 Oct 2021 12:21:57 +0200
Available diffs
- diff from 2.3.1-1ubuntu5 to 2.3.1-1ubuntu6 (358 bytes)
openjpeg2 (2.1.2-1.1+deb9u6build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian
Available diffs
openjpeg2 (2.4.0-3) unstable; urgency=medium [ Sebastien Bacher ] * d/rules: exclude the correct binary on Ubuntu/i386 [ Debian Janitor ] * Use secure copyright file specification URI. * Use secure URI in Homepage field. * Bump debhelper from deprecated 9 to 12. + debian/rules: Rely on default use of dh_missing rather than using dh_install --list-missing. * Set debhelper-compat version in Build-Depends. * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository, Repository-Browse. * Fix field name typo in debian/copyright (Comments => Comment). * Remove listed license files (LICENSE) from copyright. * Drop unnecessary dh arguments: --parallel * Remove unnecessary get-orig-source-target. -- Mathieu Malaterre <email address hidden> Tue, 09 Feb 2021 17:10:52 +0100
Available diffs
Superseded in jammy-release |
Obsolete in impish-release |
Obsolete in hirsute-release |
Deleted in hirsute-proposed (Reason: moved to Release) |
openjpeg2 (2.3.1-1ubuntu5) hirsute; urgency=medium * SECURITY UPDATE: use-after-free via directory - debian/patches/CVE-2020-15389.patch: fix double-free on input directory with mix of valid and invalid images in src/bin/jp2/opj_decompress.c. - CVE-2020-15389 * SECURITY UPDATE: heap-buffer-overflow - debian/patches/CVE-2020-27814-1.patch: grow buffer size in src/lib/openjp2/tcd.c. - debian/patches/CVE-2020-27814-2.patch: grow it again - debian/patches/CVE-2020-27814-3.patch: and some more - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!! - CVE-2020-27814 * SECURITY UPDATE: heap-buffer-overflow write - debian/patches/CVE-2020-27823.patch: fix wrong computation in src/bin/jp2/convertpng.c. - CVE-2020-27823 * SECURITY UPDATE: global-buffer-overflow - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified in src/lib/openjp2/dwt.c. - CVE-2020-27824 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27841.patch: add extra checks to src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c. - CVE-2020-27841 * SECURITY UPDATE: null pointer dereference - debian/patches/CVE-2020-27842.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27842 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27843.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27843 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27845.patch: add extra checks to src/lib/openjp2/pi.c. - CVE-2020-27845 -- Marc Deslauriers <email address hidden> Wed, 06 Jan 2021 09:44:46 -0500
Available diffs
openjpeg2 (2.3.1-1ubuntu4.20.10.1) groovy-security; urgency=medium * SECURITY UPDATE: use-after-free via directory - debian/patches/CVE-2020-15389.patch: fix double-free on input directory with mix of valid and invalid images in src/bin/jp2/opj_decompress.c. - CVE-2020-15389 * SECURITY UPDATE: heap-buffer-overflow - debian/patches/CVE-2020-27814-1.patch: grow buffer size in src/lib/openjp2/tcd.c. - debian/patches/CVE-2020-27814-2.patch: grow it again - debian/patches/CVE-2020-27814-3.patch: and some more - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!! - CVE-2020-27814 * SECURITY UPDATE: heap-buffer-overflow write - debian/patches/CVE-2020-27823.patch: fix wrong computation in src/bin/jp2/convertpng.c. - CVE-2020-27823 * SECURITY UPDATE: global-buffer-overflow - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified in src/lib/openjp2/dwt.c. - CVE-2020-27824 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27841.patch: add extra checks to src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c. - CVE-2020-27841 * SECURITY UPDATE: null pointer dereference - debian/patches/CVE-2020-27842.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27842 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27843.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27843 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27845.patch: add extra checks to src/lib/openjp2/pi.c. - CVE-2020-27845 -- Marc Deslauriers <email address hidden> Wed, 06 Jan 2021 09:44:46 -0500
Available diffs
openjpeg2 (2.3.1-1ubuntu4.20.04.1) focal-security; urgency=medium * SECURITY UPDATE: use-after-free via directory - debian/patches/CVE-2020-15389.patch: fix double-free on input directory with mix of valid and invalid images in src/bin/jp2/opj_decompress.c. - CVE-2020-15389 * SECURITY UPDATE: heap-buffer-overflow - debian/patches/CVE-2020-27814-1.patch: grow buffer size in src/lib/openjp2/tcd.c. - debian/patches/CVE-2020-27814-2.patch: grow it again - debian/patches/CVE-2020-27814-3.patch: and some more - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!! - CVE-2020-27814 * SECURITY UPDATE: heap-buffer-overflow write - debian/patches/CVE-2020-27823.patch: fix wrong computation in src/bin/jp2/convertpng.c. - CVE-2020-27823 * SECURITY UPDATE: global-buffer-overflow - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on irreversible conversion when too many decomposition levels are specified in src/lib/openjp2/dwt.c. - CVE-2020-27824 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27841.patch: add extra checks to src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c. - CVE-2020-27841 * SECURITY UPDATE: null pointer dereference - debian/patches/CVE-2020-27842.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27842 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27843.patch: add check to src/lib/openjp2/t2.c. - CVE-2020-27843 * SECURITY UPDATE: out-of-bounds read - debian/patches/CVE-2020-27845.patch: add extra checks to src/lib/openjp2/pi.c. - CVE-2020-27845 -- Marc Deslauriers <email address hidden> Wed, 06 Jan 2021 09:44:46 -0500
Available diffs
openjpeg2 (2.1.2-1.1+deb9u5build0.16.04.1) xenial-security; urgency=medium * fake sync from Debian -- Mike Salvatore <email address hidden> Mon, 14 Sep 2020 12:31:30 -0400
Available diffs
Superseded in hirsute-release |
Obsolete in groovy-release |
Published in focal-release |
Deleted in focal-proposed (Reason: moved to Release) |
openjpeg2 (2.3.1-1ubuntu4) focal; urgency=medium * SECURITY UPDATE: denial of service via excessive iteration - debian/patches/CVE-2019-12973-1.patch: detect invalid file dimensions early in src/bin/jp2/convertbmp.c. - debian/patches/CVE-2019-12973-2.patch: avoid potential infinite loop in src/bin/jp2/convertbmp.c. - CVE-2019-12973 * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-6851.patch: reject images whose coordinates are beyond INT_MAX in src/lib/openjp2/j2k.c. - CVE-2020-6851 * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor - debian/patches/CVE-2020-8112.patch: avoid integer overflow in src/lib/openjp2/tcd.c. - CVE-2020-8112 -- Marc Deslauriers <email address hidden> Wed, 19 Feb 2020 09:52:00 -0500
Available diffs
openjpeg2 (2.3.1-1ubuntu3) focal; urgency=medium * Actually omit libopenjpip-server, not libkate-tools which is not in this package. -- Steve Langasek <email address hidden> Mon, 17 Feb 2020 09:39:20 -0800
Available diffs
- diff from 2.3.1-1 (in Debian) to 2.3.1-1ubuntu3 (1.0 KiB)
- diff from 2.3.1-1ubuntu2 to 2.3.1-1ubuntu3 (556 bytes)
Superseded in focal-proposed |
openjpeg2 (2.3.1-1ubuntu2) focal; urgency=medium * No-change rebuild with fixed binutils on arm64. -- Matthias Klose <email address hidden> Mon, 10 Feb 2020 08:14:07 +0100
Available diffs
- diff from 2.3.1-1ubuntu1 to 2.3.1-1ubuntu2 (347 bytes)
openjpeg2 (2.3.1-1ubuntu1) focal; urgency=medium * Omit libopenjpip-server on i386, we only want the libraries for compatibility. -- Steve Langasek <email address hidden> Tue, 07 Jan 2020 14:52:51 -0800
Available diffs
- diff from 2.3.1-1 (in Debian) to 2.3.1-1ubuntu1 (901 bytes)
openjpeg2 (2.3.0-2build0.19.04.1) disco-security; urgency=medium * No change rebuild. -- Eduardo Barretto <email address hidden> Mon, 21 Oct 2019 10:07:27 -0300
Available diffs
openjpeg2 (2.3.0-2build0.19.10.1) eoan-security; urgency=medium * No change rebuild. -- Eduardo Barretto <email address hidden> Mon, 21 Oct 2019 09:57:46 -0300
Available diffs
openjpeg2 (2.3.0-2build1) focal; urgency=medium * No change rebuild -- Eduardo Barretto <email address hidden> Mon, 21 Oct 2019 14:08:40 -0300
Available diffs
- diff from 2.3.0-2 (in Debian) to 2.3.0-2build1 (308 bytes)
Superseded in focal-release |
Superseded in focal-release |
Deleted in focal-proposed (Reason: moved to Release) |
openjpeg2 (2.3.1-1) unstable; urgency=medium * New upstream release, addressing following security issues: - CVE-2018-20847 (Closes: #931294) - CVE-2018-21010 (Closes: #939553) - CVE-2018-5727 (Closes: #888532) * Remove following patches, applied upstream: - CVE-2017-17480.patch - CVE-2018-14423.patch - CVE-2018-18088.patch - CVE-2018-5785.patch - CVE-2018-6616.patch * Remove debian/patches/multiarch_path.patch: - useless since latest upstream changes. * Bump Standards-Version to 4.4.1. * Refresh and rework manpages. * Remove debian/README.source (Closes: #846390). -- Hugo Lefeuvre <email address hidden> Mon, 07 Oct 2019 13:46:43 +0200
Available diffs
openjpeg2 (2.3.0-2build0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: Sync from Debian
Available diffs
openjpeg2 (2.1.2-1.1+deb9u3build0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: sync from Debian stretch-security
Available diffs
Superseded in focal-release |
Obsolete in eoan-release |
Obsolete in disco-release |
Deleted in disco-proposed (Reason: moved to release) |
openjpeg2 (2.3.0-2) unstable; urgency=high [ Hugo Lefeuvre ] * CVE-2017-17480: stack-based buffer overflow in the pgxtovolume function in jp3d/convert.c (Closes: #884738). * CVE-2018-14423: division-by-zero in pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c (Closes: #904873). * CVE-2018-18088: null pointer dereference in imagetopnm in jp2/convert.c (Closes: #910763). * CVE-2018-5785: integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c) (Closes: #888533). * CVE-2018-6616: excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (Closes: #889683). [ Mathieu Malaterre ] * Add Hugo as Uploader -- Mathieu Malaterre <email address hidden> Sun, 10 Mar 2019 18:34:51 +0100
Available diffs
- diff from 2.3.0-1.1 to 2.3.0-2 (3.8 KiB)
openjpeg2 (2.3.0-1.1) unstable; urgency=medium * Non-maintainer upload. * Fix "FTBFS with Java 9 due to -source/-target only": apply patch by Markus Koschany to build with Java 9 or later. (Closes: #873997) -- gregor herrmann <email address hidden> Sun, 02 Dec 2018 18:18:22 +0100
Available diffs
- diff from 2.3.0-1 to 2.3.0-1.1 (835 bytes)
openjpeg2 (2.1.2-1.1+deb9u2build0.1) xenial-security; urgency=medium * SECURITY UPDATE: sync from Debian stretch-security - Ubuntu changes were applied upstream, so dropping.
Available diffs
openjpeg2 (2.1.2-1.1+deb9u2build0.17.04.1) zesty-security; urgency=medium * fake sync from Debian
Available diffs
Superseded in disco-release |
Obsolete in cosmic-release |
Published in bionic-release |
Deleted in bionic-proposed (Reason: moved to release) |
openjpeg2 (2.3.0-1) unstable; urgency=medium * New upstream release. Closes: #877758 * Drop explicit -dbg package. Closes: #877676 * Fix CVE-2017-14041. Closes: #874115 * Fix CVE-2017-14151. Closes: #874430 * Fix CVE-2017-14152. Closes: #874431 -- Mathieu Malaterre <email address hidden> Mon, 16 Oct 2017 07:43:41 +0200
Available diffs
- diff from 2.2.0-1 to 2.3.0-1 (74.3 KiB)
Superseded in bionic-release |
Obsolete in artful-release |
Deleted in artful-proposed (Reason: moved to release) |
openjpeg2 (2.2.0-1) unstable; urgency=medium * New upstream release. Closes: #872041 * Fix CVE-2016-9113. Closes: #844552 * Fix CVE-2016-9114. Closes: #844553 * Fix CVE-2016-9115. Closes: #844554 * Fix CVE-2016-9116. Closes: #844555 * Fix CVE-2016-9117. Closes: #844556 -- Mathieu Malaterre <email address hidden> Fri, 22 Sep 2017 21:51:36 +0200
Available diffs
- diff from 2.1.2-1.3 to 2.2.0-1 (1.1 MiB)
openjpeg2 (2.1.2-1.3) unstable; urgency=medium * Fix FTFBS (Closes: #871905) -- Moritz Muehlenhoff <email address hidden> Sat, 12 Aug 2017 15:54:38 +0200
Available diffs
- diff from 2.1.2-1.1 to 2.1.2-1.3 (3.3 KiB)
- diff from 2.1.2-1.2 to 2.1.2-1.3 (543 bytes)
openjpeg2 (2.1.2-1.2) unstable; urgency=medium * Non-maintainer upload * Fix CVE-2016-1626, CVE-2016-1628, CVE-2016-5152, CVE-2016-9112 and CVE-2016-9118.patch -- Moritz Muehlenhoff <email address hidden> Fri, 11 Aug 2017 22:17:07 +0200
Superseded in artful-release |
Obsolete in zesty-release |
Deleted in zesty-proposed (Reason: moved to release) |
openjpeg2 (2.1.2-1.1) unstable; urgency=medium * Non-maintainer upload. * Add CVE-2016-9572_CVE-2016-9573.patch patch. CVE-2016-9572: NULL pointer dereference in input decoding CVE-2016-9573: Heap out-of-bounds read due to insufficient check in imagetopnm(). (Closes: #851422) -- Salvatore Bonaccorso <email address hidden> Sun, 22 Jan 2017 14:18:13 +0100
Available diffs
- diff from 2.1.2-1 to 2.1.2-1.1 (2.8 KiB)
openjpeg2 (2.1.1-1ubuntu0.1) yakkety-security; urgency=medium * SECURITY UPDATE: Out-of-bound heap write possible resulting in heap corruption and arbitrary code execution (lp: #1630702) - debian/patches/CVE-2016-8332.patch: fix incrementing of "l_tcp->m_nb_mcc_records" in opj_j2k_read_mcc in src/lib/openjp2/j2k.c. - CVE-2016-8332 * SECURITY UPDATE: Integer overflow possible resulting in arbitrary code execution via a crafted JP2 file, triggering out-of-bound read or write (lp: #1630702) - debian/patches/CVE-2016-7163.patch: fix an integer overflow issue in function opj_pi_create_decode of pi.c in src/lib/openjp2/pi.c. - CVE-2016-7163 -- Nikita Yerenkov-Scott <email address hidden> Sat, 08 Oct 2016 16:10:43 +0100
Available diffs
openjpeg2 (2.1.0-2.1ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Out-of-bound heap write possible resulting in heap corruption and arbitrary code execution (lp: #1630702) - debian/patches/CVE-2016-8332.patch: fix incrementing of "l_tcp->m_nb_mcc_records" in opj_j2k_read_mcc in src/lib/openjp2/j2k.c. - CVE-2016-8332 * SECURITY UPDATE: Integer overflow possible resulting in arbitrary code execution via a crafted JP2 file, triggering out-of-bound read or write (lp: #1630702) - debian/patches/CVE-2016-7163.patch: fix an integer overflow issue in function opj_pi_create_decode of pi.c in src/lib/openjp2/pi.c. - CVE-2016-7163 -- Nikita Yerenkov-Scott <email address hidden> Sat, 08 Oct 2016 16:10:43 +0100
Available diffs
openjpeg2 (2.1.2-1) unstable; urgency=medium * New upstream. Closes: #839120 * Fix CVE-2016-7163. Closes: #837604 * Fix CVE-2016-7445. Closes: #838690 * Remove patches applied upstream: -- Mathieu Malaterre <email address hidden> Thu, 29 Sep 2016 08:11:30 +0200
Available diffs
- diff from 2.1.1-1 to 2.1.2-1 (19.3 KiB)
Superseded in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
openjpeg2 (2.1.1-1) unstable; urgency=medium * New upstream. Closes: #829734 + d/watch points toward github now + Fix man page typos. Closes: #772889, #784377 + Raise priority to optional. Closes: #822577 + Fix multiple CVEs: Closes: #800453, #800149, #818399 * Fix pc file. Closes: #787383 * Remove reference to contrib. Closes: #820190 * Bump Std-Vers to 3.9.8, no changes needed -- Mathieu Malaterre <email address hidden> Mon, 11 Jul 2016 09:28:19 +0200
Available diffs
- diff from 2.1.0-2.1build1 (in Ubuntu) to 2.1.1-1 (919.5 KiB)
openjpeg2 (2.1.0-2.1build1) yakkety; urgency=medium * No-change rebuild for libpng soname change. -- Matthias Klose <email address hidden> Sat, 23 Apr 2016 00:17:52 +0000
Available diffs
Superseded in yakkety-release |
Published in xenial-release |
Obsolete in wily-release |
Deleted in wily-proposed (Reason: moved to release) |
openjpeg2 (2.1.0-2.1) unstable; urgency=high * Non-maintainer upload. * Apache 2.4 transition: (Closes: #786333) + d/rules: Added --with apache2. + Drop d/libopenjpip-server.install. + Drop d/libopenjpip-server.prerm. + d/control: Add build-depends on dh-apache2, replace depends on apache2.2-bin by ${misc:Recommends}, add recommends on libapache2-mod-fastcgi. + New d/libopenjpip-server.conf for apache2 fastcgi setup. + Drop d/libopenjpip-server.load. + New d/libopenjpip-server.apache2 to set up the configuration. -- Jean-Michel Vourgère <email address hidden> Thu, 21 May 2015 23:05:40 +0200
Available diffs
- diff from 2.1.0-2 to 2.1.0-2.1 (4.3 KiB)
Superseded in wily-release |
Obsolete in vivid-release |
Deleted in vivid-proposed (Reason: moved to release) |
openjpeg2 (2.1.0-2) unstable; urgency=low * Install *.pc files. Closes: #762251 * Remove cmake-fatal-error export stuff * Fix warnings in d/copyright * Bump Std-Vers to 3.9.6, no changes needed * Fix include path in export file to handle multi-arch install + debian/patches/multiarch_path.patch -- Mathieu Malaterre <email address hidden> Tue, 07 Oct 2014 13:14:43 +0200
1 → 42 of 42 results | First • Previous • Next • Last |