Change log for openjpeg2 package in Ubuntu

142 of 42 results
Published in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
openjpeg2 (2.5.0-2build3) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 06:41:24 +0000

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
openjpeg2 (2.5.0-2build2) noble; urgency=medium

  * No-change rebuild against libcurl3t64-gnutls

 -- Steve Langasek <email address hidden>  Sat, 16 Mar 2024 07:14:29 +0000
Superseded in noble-proposed
openjpeg2 (2.5.0-2build1) noble; urgency=medium

  * No-change rebuild against libpng16-16t64

 -- Steve Langasek <email address hidden>  Thu, 29 Feb 2024 07:40:22 +0000
Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Published in mantic-release
Deleted in mantic-proposed (Reason: Moved to mantic)
openjpeg2 (2.5.0-2) unstable; urgency=medium

  * Team upload.
  * Fix broken symlink, actually install jar. Closes: #1036584

 -- Andreas Metzler <email address hidden>  Fri, 26 May 2023 12:16:24 +0200
Published in bionic-updates
Published in bionic-security
openjpeg2 (2.3.0-2+deb10u2build0.18.04.1) bionic-security; urgency=medium

  * fake sync from Debian

 -- Amir Naseredini <email address hidden>  Fri, 10 Mar 2023 17:03:30 +0000
Superseded in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
openjpeg2 (2.5.0-1build1) lunar; urgency=medium

  * Rebuild against latest tiff

 -- Jeremy Bicha <email address hidden>  Sat, 04 Feb 2023 11:07:13 -0500
Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
openjpeg2 (2.5.0-1) unstable; urgency=medium

  * New upstream version 2.5.0
  * d/control: Upstream has removed JP3D support
  * d/patches: Refresh patches (removed those applied upstream)
  * d/rules: Update rules to 2.5 location
  * d/control: Update Std-Vers to 4.6.1 no changes needed

 -- Mathieu Malaterre <email address hidden>  Mon, 20 Jun 2022 16:05:24 +0200

Available diffs

Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
openjpeg2 (2.4.0-6) unstable; urgency=medium

  * d/copyright: Remove lintian error duplicate-globbing-patterns
  * d/rules: Do not install *.so symlinks for jp3d/jpip. Closes: #1003807

 -- Mathieu Malaterre <email address hidden>  Mon, 17 Jan 2022 08:07:17 +0100
Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
openjpeg2 (2.4.0-5) unstable; urgency=medium

  * d/patches: Make sure to always install manpages
  * d/control: Incoporate suggestion from Multiarch hinter

 -- Mathieu Malaterre <email address hidden>  Fri, 14 Jan 2022 16:18:56 +0100

Available diffs

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
Deleted in impish-proposed (Reason: Moved to jammy)
openjpeg2 (2.3.1-1ubuntu6) impish; urgency=medium

  * No-change rebuild to build packages with zstd compression.

 -- Matthias Klose <email address hidden>  Thu, 07 Oct 2021 12:21:57 +0200

Available diffs

Published in xenial-updates
Published in xenial-security
openjpeg2 (2.1.2-1.1+deb9u6build0.16.04.1) xenial-security; urgency=medium

  * fake sync from Debian

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
openjpeg2 (2.4.0-3) unstable; urgency=medium

  [ Sebastien Bacher ]
  * d/rules: exclude the correct binary on Ubuntu/i386

  [ Debian Janitor ]
  * Use secure copyright file specification URI.
  * Use secure URI in Homepage field.
  * Bump debhelper from deprecated 9 to 12. + debian/rules: Rely on default use of dh_missing rather than using dh_install --list-missing.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository, Repository-Browse.
  * Fix field name typo in debian/copyright (Comments => Comment).
  * Remove listed license files (LICENSE) from copyright.
  * Drop unnecessary dh arguments: --parallel
  * Remove unnecessary get-orig-source-target.

 -- Mathieu Malaterre <email address hidden>  Tue, 09 Feb 2021 17:10:52 +0100
Superseded in jammy-release
Obsolete in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
openjpeg2 (2.3.1-1ubuntu5) hirsute; urgency=medium

  * SECURITY UPDATE: use-after-free via directory
    - debian/patches/CVE-2020-15389.patch: fix double-free on input
      directory with mix of valid and invalid images in
      src/bin/jp2/opj_decompress.c.
    - CVE-2020-15389
  * SECURITY UPDATE: heap-buffer-overflow
    - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
      src/lib/openjp2/tcd.c.
    - debian/patches/CVE-2020-27814-2.patch: grow it again
    - debian/patches/CVE-2020-27814-3.patch: and some more
    - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
    - CVE-2020-27814
  * SECURITY UPDATE: heap-buffer-overflow write
    - debian/patches/CVE-2020-27823.patch: fix wrong computation in
      src/bin/jp2/convertpng.c.
    - CVE-2020-27823
  * SECURITY UPDATE: global-buffer-overflow
    - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
      irreversible conversion when too many decomposition levels are
      specified in src/lib/openjp2/dwt.c.
    - CVE-2020-27824
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27841.patch: add extra checks to
      src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c.
    - CVE-2020-27841
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2020-27842.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27842
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27843.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27843
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27845.patch: add extra checks to
      src/lib/openjp2/pi.c.
    - CVE-2020-27845

 -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 09:44:46 -0500

Available diffs

Obsolete in groovy-updates
Obsolete in groovy-security
openjpeg2 (2.3.1-1ubuntu4.20.10.1) groovy-security; urgency=medium

  * SECURITY UPDATE: use-after-free via directory
    - debian/patches/CVE-2020-15389.patch: fix double-free on input
      directory with mix of valid and invalid images in
      src/bin/jp2/opj_decompress.c.
    - CVE-2020-15389
  * SECURITY UPDATE: heap-buffer-overflow
    - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
      src/lib/openjp2/tcd.c.
    - debian/patches/CVE-2020-27814-2.patch: grow it again
    - debian/patches/CVE-2020-27814-3.patch: and some more
    - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
    - CVE-2020-27814
  * SECURITY UPDATE: heap-buffer-overflow write
    - debian/patches/CVE-2020-27823.patch: fix wrong computation in
      src/bin/jp2/convertpng.c.
    - CVE-2020-27823
  * SECURITY UPDATE: global-buffer-overflow
    - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
      irreversible conversion when too many decomposition levels are
      specified in src/lib/openjp2/dwt.c.
    - CVE-2020-27824
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27841.patch: add extra checks to
      src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c.
    - CVE-2020-27841
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2020-27842.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27842
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27843.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27843
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27845.patch: add extra checks to
      src/lib/openjp2/pi.c.
    - CVE-2020-27845

 -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 09:44:46 -0500
Published in focal-updates
Published in focal-security
openjpeg2 (2.3.1-1ubuntu4.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: use-after-free via directory
    - debian/patches/CVE-2020-15389.patch: fix double-free on input
      directory with mix of valid and invalid images in
      src/bin/jp2/opj_decompress.c.
    - CVE-2020-15389
  * SECURITY UPDATE: heap-buffer-overflow
    - debian/patches/CVE-2020-27814-1.patch: grow buffer size in
      src/lib/openjp2/tcd.c.
    - debian/patches/CVE-2020-27814-2.patch: grow it again
    - debian/patches/CVE-2020-27814-3.patch: and some more
    - debian/patches/CVE-2020-27814-4.patch: bigger, BIGGER!!!
    - CVE-2020-27814
  * SECURITY UPDATE: heap-buffer-overflow write
    - debian/patches/CVE-2020-27823.patch: fix wrong computation in
      src/bin/jp2/convertpng.c.
    - CVE-2020-27823
  * SECURITY UPDATE: global-buffer-overflow
    - debian/patches/CVE-2020-27824.patch: avoid global buffer overflow on
      irreversible conversion when too many decomposition levels are
      specified in src/lib/openjp2/dwt.c.
    - CVE-2020-27824
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27841.patch: add extra checks to
      src/lib/openjp2/pi.c, src/lib/openjp2/pi.h, src/lib/openjp2/t2.c.
    - CVE-2020-27841
  * SECURITY UPDATE: null pointer dereference
    - debian/patches/CVE-2020-27842.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27842
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27843.patch: add check to
      src/lib/openjp2/t2.c.
    - CVE-2020-27843
  * SECURITY UPDATE: out-of-bounds read
    - debian/patches/CVE-2020-27845.patch: add extra checks to
      src/lib/openjp2/pi.c.
    - CVE-2020-27845

 -- Marc Deslauriers <email address hidden>  Wed, 06 Jan 2021 09:44:46 -0500
Superseded in xenial-updates
Superseded in xenial-security
openjpeg2 (2.1.2-1.1+deb9u5build0.16.04.1) xenial-security; urgency=medium

  * fake sync from Debian

 -- Mike Salvatore <email address hidden>  Mon, 14 Sep 2020 12:31:30 -0400
Superseded in hirsute-release
Obsolete in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
openjpeg2 (2.3.1-1ubuntu4) focal; urgency=medium

  * SECURITY UPDATE: denial of service via excessive iteration
    - debian/patches/CVE-2019-12973-1.patch: detect invalid file dimensions
      early in src/bin/jp2/convertbmp.c.
    - debian/patches/CVE-2019-12973-2.patch: avoid potential infinite loop
      in src/bin/jp2/convertbmp.c.
    - CVE-2019-12973
  * SECURITY UPDATE: heap overflow in opj_t1_clbl_decode_processor
    - debian/patches/CVE-2020-6851.patch: reject images whose
      coordinates are beyond INT_MAX in src/lib/openjp2/j2k.c.
    - CVE-2020-6851
  * SECURITY UPDATE: another heap overflow in opj_t1_clbl_decode_processor
    - debian/patches/CVE-2020-8112.patch: avoid integer overflow in
      src/lib/openjp2/tcd.c.
    - CVE-2020-8112

 -- Marc Deslauriers <email address hidden>  Wed, 19 Feb 2020 09:52:00 -0500

Available diffs

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
openjpeg2 (2.3.1-1ubuntu3) focal; urgency=medium

  * Actually omit libopenjpip-server, not libkate-tools which is not in
    this package.

 -- Steve Langasek <email address hidden>  Mon, 17 Feb 2020 09:39:20 -0800
Superseded in focal-proposed
openjpeg2 (2.3.1-1ubuntu2) focal; urgency=medium

  * No-change rebuild with fixed binutils on arm64.

 -- Matthias Klose <email address hidden>  Mon, 10 Feb 2020 08:14:07 +0100

Available diffs

Superseded in focal-proposed
Superseded in focal-proposed
openjpeg2 (2.3.1-1ubuntu1) focal; urgency=medium

  * Omit libopenjpip-server on i386, we only want the libraries for
    compatibility.

 -- Steve Langasek <email address hidden>  Tue, 07 Jan 2020 14:52:51 -0800
Obsolete in disco-updates
Obsolete in disco-security
openjpeg2 (2.3.0-2build0.19.04.1) disco-security; urgency=medium

  * No change rebuild.

 -- Eduardo Barretto <email address hidden>  Mon, 21 Oct 2019 10:07:27 -0300
Obsolete in eoan-updates
Obsolete in eoan-security
openjpeg2 (2.3.0-2build0.19.10.1) eoan-security; urgency=medium

  * No change rebuild.

 -- Eduardo Barretto <email address hidden>  Mon, 21 Oct 2019 09:57:46 -0300
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
openjpeg2 (2.3.0-2build1) focal; urgency=medium

  * No change rebuild

 -- Eduardo Barretto <email address hidden>  Mon, 21 Oct 2019 14:08:40 -0300
Superseded in focal-release
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
openjpeg2 (2.3.1-1) unstable; urgency=medium

  * New upstream release, addressing following security issues:
    - CVE-2018-20847 (Closes: #931294)
    - CVE-2018-21010 (Closes: #939553)
    - CVE-2018-5727 (Closes: #888532)
  * Remove following patches, applied upstream:
    - CVE-2017-17480.patch
    - CVE-2018-14423.patch
    - CVE-2018-18088.patch
    - CVE-2018-5785.patch
    - CVE-2018-6616.patch
  * Remove debian/patches/multiarch_path.patch:
    - useless since latest upstream changes.
  * Bump Standards-Version to 4.4.1.
  * Refresh and rework manpages.
  * Remove debian/README.source (Closes: #846390).

 -- Hugo Lefeuvre <email address hidden>  Mon, 07 Oct 2019 13:46:43 +0200
Superseded in bionic-updates
Superseded in bionic-security
openjpeg2 (2.3.0-2build0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Sync from Debian

Superseded in xenial-updates
Superseded in xenial-security
openjpeg2 (2.1.2-1.1+deb9u3build0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: sync from Debian stretch-security

Superseded in focal-release
Obsolete in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
openjpeg2 (2.3.0-2) unstable; urgency=high

  [ Hugo Lefeuvre ]
  * CVE-2017-17480: stack-based buffer overflow in the pgxtovolume function in
    jp3d/convert.c (Closes: #884738).
  * CVE-2018-14423: division-by-zero in pi_next_pcrl, pi_next_cprl, and
    pi_next_rpcl in lib/openjp3d/pi.c (Closes: #904873).
  * CVE-2018-18088: null pointer dereference in imagetopnm in jp2/convert.c
    (Closes: #910763).
  * CVE-2018-5785: integer overflow caused by an out-of-bounds left shift in the
    opj_j2k_setup_encoder function (openjp2/j2k.c) (Closes: #888533).
  * CVE-2018-6616: excessive iteration in the opj_t1_encode_cblks function of
    openjp2/t1.c (Closes: #889683).

  [ Mathieu Malaterre ]
  * Add Hugo as Uploader

 -- Mathieu Malaterre <email address hidden>  Sun, 10 Mar 2019 18:34:51 +0100

Available diffs

Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
openjpeg2 (2.3.0-1.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Fix "FTBFS with Java 9 due to -source/-target only":
    apply patch by Markus Koschany to build with Java 9 or later.
    (Closes: #873997)

 -- gregor herrmann <email address hidden>  Sun, 02 Dec 2018 18:18:22 +0100

Available diffs

Superseded in xenial-updates
Superseded in xenial-security
openjpeg2 (2.1.2-1.1+deb9u2build0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: sync from Debian stretch-security
    - Ubuntu changes were applied upstream, so dropping.

Obsolete in zesty-updates
Obsolete in zesty-security
openjpeg2 (2.1.2-1.1+deb9u2build0.17.04.1) zesty-security; urgency=medium

  * fake sync from Debian

Superseded in disco-release
Obsolete in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
openjpeg2 (2.3.0-1) unstable; urgency=medium

  * New upstream release. Closes: #877758
  * Drop explicit -dbg package. Closes: #877676
  * Fix CVE-2017-14041. Closes: #874115
  * Fix CVE-2017-14151. Closes: #874430
  * Fix CVE-2017-14152. Closes: #874431

 -- Mathieu Malaterre <email address hidden>  Mon, 16 Oct 2017 07:43:41 +0200

Available diffs

Superseded in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
openjpeg2 (2.2.0-1) unstable; urgency=medium

  * New upstream release. Closes: #872041
  * Fix CVE-2016-9113. Closes: #844552
  * Fix CVE-2016-9114. Closes: #844553
  * Fix CVE-2016-9115. Closes: #844554
  * Fix CVE-2016-9116. Closes: #844555
  * Fix CVE-2016-9117. Closes: #844556

 -- Mathieu Malaterre <email address hidden>  Fri, 22 Sep 2017 21:51:36 +0200

Available diffs

Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
openjpeg2 (2.1.2-1.3) unstable; urgency=medium

  * Fix FTFBS (Closes: #871905)

 -- Moritz Muehlenhoff <email address hidden>  Sat, 12 Aug 2017 15:54:38 +0200
Superseded in artful-proposed
openjpeg2 (2.1.2-1.2) unstable; urgency=medium

  * Non-maintainer upload
  * Fix CVE-2016-1626, CVE-2016-1628, CVE-2016-5152, CVE-2016-9112 and
    CVE-2016-9118.patch

 -- Moritz Muehlenhoff <email address hidden>  Fri, 11 Aug 2017 22:17:07 +0200
Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
openjpeg2 (2.1.2-1.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Add CVE-2016-9572_CVE-2016-9573.patch patch.
    CVE-2016-9572: NULL pointer dereference in input decoding
    CVE-2016-9573: Heap out-of-bounds read due to insufficient check in
    imagetopnm(). (Closes: #851422)

 -- Salvatore Bonaccorso <email address hidden>  Sun, 22 Jan 2017 14:18:13 +0100

Available diffs

Obsolete in yakkety-updates
Obsolete in yakkety-security
openjpeg2 (2.1.1-1ubuntu0.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: Out-of-bound heap write possible resulting
    in heap corruption and arbitrary code execution (lp: #1630702)
    - debian/patches/CVE-2016-8332.patch: fix incrementing of
      "l_tcp->m_nb_mcc_records" in opj_j2k_read_mcc
      in src/lib/openjp2/j2k.c.
    - CVE-2016-8332
  * SECURITY UPDATE: Integer overflow possible resulting in
    arbitrary code execution via a crafted JP2 file,
    triggering out-of-bound read or write (lp: #1630702)
    - debian/patches/CVE-2016-7163.patch: fix an integer
      overflow issue in function opj_pi_create_decode of
      pi.c in src/lib/openjp2/pi.c.
    - CVE-2016-7163

 -- Nikita Yerenkov-Scott <email address hidden>  Sat, 08 Oct 2016 16:10:43 +0100
Superseded in xenial-updates
Superseded in xenial-security
openjpeg2 (2.1.0-2.1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Out-of-bound heap write possible resulting
    in heap corruption and arbitrary code execution (lp: #1630702)
    - debian/patches/CVE-2016-8332.patch: fix incrementing of
      "l_tcp->m_nb_mcc_records" in opj_j2k_read_mcc
      in src/lib/openjp2/j2k.c.
    - CVE-2016-8332
  * SECURITY UPDATE: Integer overflow possible resulting in
    arbitrary code execution via a crafted JP2 file,
    triggering out-of-bound read or write (lp: #1630702)
    - debian/patches/CVE-2016-7163.patch: fix an integer
      overflow issue in function opj_pi_create_decode of
      pi.c in src/lib/openjp2/pi.c.
    - CVE-2016-7163

 -- Nikita Yerenkov-Scott <email address hidden>  Sat, 08 Oct 2016 16:10:43 +0100
Superseded in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
openjpeg2 (2.1.2-1) unstable; urgency=medium

  * New upstream. Closes: #839120
  * Fix CVE-2016-7163. Closes: #837604
  * Fix CVE-2016-7445. Closes: #838690
  * Remove patches applied upstream:

 -- Mathieu Malaterre <email address hidden>  Thu, 29 Sep 2016 08:11:30 +0200

Available diffs

Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
openjpeg2 (2.1.1-1) unstable; urgency=medium

  * New upstream. Closes: #829734
    + d/watch points toward github now
    + Fix man page typos. Closes: #772889, #784377
    + Raise priority to optional. Closes: #822577
    + Fix multiple CVEs: Closes: #800453, #800149, #818399
  * Fix pc file. Closes: #787383
  * Remove reference to contrib. Closes: #820190
  * Bump Std-Vers to 3.9.8, no changes needed

 -- Mathieu Malaterre <email address hidden>  Mon, 11 Jul 2016 09:28:19 +0200
Superseded in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
openjpeg2 (2.1.0-2.1build1) yakkety; urgency=medium

  * No-change rebuild for libpng soname change.

 -- Matthias Klose <email address hidden>  Sat, 23 Apr 2016 00:17:52 +0000
Superseded in yakkety-release
Published in xenial-release
Obsolete in wily-release
Deleted in wily-proposed (Reason: moved to release)
openjpeg2 (2.1.0-2.1) unstable; urgency=high

  * Non-maintainer upload.
  * Apache 2.4 transition: (Closes: #786333)
    + d/rules: Added --with apache2.
    + Drop d/libopenjpip-server.install.
    + Drop d/libopenjpip-server.prerm.
    + d/control: Add build-depends on dh-apache2, replace depends on
      apache2.2-bin by ${misc:Recommends}, add recommends on
      libapache2-mod-fastcgi.
    + New d/libopenjpip-server.conf for apache2 fastcgi setup.
    + Drop d/libopenjpip-server.load.
    + New d/libopenjpip-server.apache2 to set up the configuration.

 -- Jean-Michel Vourgère <email address hidden>  Thu, 21 May 2015 23:05:40 +0200

Available diffs

Superseded in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
openjpeg2 (2.1.0-2) unstable; urgency=low


  * Install *.pc files. Closes: #762251
  * Remove cmake-fatal-error export stuff
  * Fix warnings in d/copyright
  * Bump Std-Vers to 3.9.6, no changes needed
  * Fix include path in export file to handle multi-arch install
    + debian/patches/multiarch_path.patch

 -- Mathieu Malaterre <email address hidden>  Tue, 07 Oct 2014 13:14:43 +0200
142 of 42 results