[BACK]Return to distinfo CVS log [TXT][DIR] Up to [cvs.NetBSD.org] / pkgsrc / devel / exempi

File: [cvs.NetBSD.org] / pkgsrc / devel / exempi / distinfo (download)

Revision 1.11, Wed Jun 5 06:57:04 2019 UTC (15 months, 3 weeks ago) by nia
Branch: MAIN
CVS Tags: pkgsrc-2019Q4-base, pkgsrc-2019Q4, pkgsrc-2019Q3-base, pkgsrc-2019Q3, pkgsrc-2019Q2-base, pkgsrc-2019Q2
Changes since 1.10: +5 -5 lines

exempi: Update to 2.5.0

2.5.0 - 2019/01/06

- Upgrade XMPCore to Adobe XMP SDK CC 2016.07
  - Support for iOS in XMPFiles
  - New DOM based API are added in XMP Core to access metadata tree
    hierarchy. (not exposed yet in Exempi)
  - Added support XMP/metadata in utf-8 encoded uncompressed SVG files in XMPFiles.
  - Added support of GIF handler in XMPFiles.
  - Added support for reconciliation of iXML TRACK_LIST and its components to get
    microphone data.
  - Added support for IFDs of type 13 in TIFF.
  - Added support for MPEG4 videos shot from Google Nexus 5 camera.
  - Restructured the implementation of XDCAM Handler to support File Access Mode (FAM)
    and Simple Access Mode (SAM)
  - Added built-in support for iXML namespace in XMPCore.
  - Modified the alias tiff:ImageDescription for dc:description as language alternative
    array instead of simple property.
  - Lot of bug fixes in XMPFiles and XMPCore.
- Removed Exempi provided support for GIF in favour of Adobe's.

- New: API NS_XML constant

- Bug #5: Restrict the exported symbols. Only the symbols marked with API_EXPORT
  are exported by the shared library as to not allow another library to import the XMP
  SDK symbols.
- Bug #105580: Access memory aligned on ARM.


- Added tests for Adobe SDK.
- Fixed warnings and other issues and Adobe SDK.
- Compile with much more warnings enabled.

2.4.5 - 2018/03/07

- Bug #105204: [CVE-2018-7730] fix a buffer overflow in the PSD parser.
- Bug #105205: [CVE-2018-7728] fix a buffer overflow in the TIFF parser.
- Bug #105206: [CVE-2018-7729] fix a buffer overflow in PostScript parser.
- Bug #105247: [CVE-2018-7731] fix a null dereference in WEBP parser.

2.4.4 - 2018/02/04

- Bug #102197: Properly initialize pointers in WEBP.
- Bug #102151: Fix an infinite loop in RIFF parser.
- Bug #102483: Fix an infinite loop in QuickTime parser.
- Bug #102484: Fix an infinite loop in ASF parser.
- Bug #104885: Adjust minimum version for gcc in documentation.

2.4.3 - 2017/08/03

- Bug #100397: Fix a buffer overrun, memcpy() on overlapping
  regions, use after free in the exception handling.
- Bug #101913: Fix a fatal assert with corrupt WEBP.
- Bug #101914: Fix a crash on a corrupt file.

2.4.2 - 2017/01/29

- Properly define BanAllEntityUsage.
  See https://bugzilla.redhat.com/show_bug.cgi?id=888765

2.4.1 - 2017/01/23

- Bug #99494: Restore error reporting.


- Added test for xmp_parse()
- Renamed test3 to testiterator and more comprehensive test for
  iterator to detect thing like bug 99480

Release notes:

- In 2.4.0 the XMP iterator corrected behaviour when used for
  XMP_ITER_JUSTLEAFNAME: The returned values are now set to they
  actual schema NS instead of the top level one.
  This required fixed in third party packages:
  This changes is the result of a bug fix in Adobe SDK.
  See bug #99480

2.4.0 - 2017/01/07

- Bug #89449: Upgrade XMPCore to Adobe XMP CC 2014.12.
  - New flag to optimize layout on MPEG4 files.
  - GoPro MPEG4 video files support.
  - Improved JPEG support.
  - iXML support in WAVE files.
  - Several bugs and memory leaks fixes.
  - Changes from Adobe XMP CC 2013.06.
    - Pluggable file handlers (not exposed yet in Exempi)
    - Support for Exif 2.3 properties
    - New RIFF file handler
    - Better Postscript support.
    - Lot of bug fixes.
- Now require (partial) C++11 support to compile (gcc 4.4.7 tested)
- New: WebP format handler (contributed: Frankie Dintino, The Atlantic)


- Exempi is now automatically build and the test run by Travis CI.

$NetBSD: distinfo,v 1.11 2019/06/05 06:57:04 nia Exp $

SHA1 (exempi-2.5.0.tar.bz2) = 2461c1149187350c1b174e23b188e7884a32ec66
RMD160 (exempi-2.5.0.tar.bz2) = e4e1fd4e12f6b1ced36e085f524884be45575aa6
SHA512 (exempi-2.5.0.tar.bz2) = 1d042ffe3c3daadf937c4938e7892d52c4835275065e159f7991ddc9f533424fb6cd7d607600c3381440020db9dfa06af5ae15168d7a8012358fa5c8ac453bba
Size (exempi-2.5.0.tar.bz2) = 3658187 bytes