| AArch64 | |
| ppc64le | |
| s390x | |
| x86-64 |
- Update to release 0.11.1
* Fixed decode of Unicode string streams.
* Fixed UCS-2 to UTF-8 conversion for the chars 128-255.
* Moved PSPACE entities from BLOCKS to ENTITIES
* Fixed \r\n quoting in DXF texts
* Generalize and fix DXF text splitup into 255 chunks and
quoting, add basic shift-jis quoting support for Katagana and
Hiragana letters (Japanese \M+1xxxx => Unicode \U+XXXX)
* Added indxf dwg_has_subclass check to avoid buffer overflows
when writing to wrong subclasses.
* Improved SAB 2 to SAT 1 conversion: Split overlarge blocks
into block_size of max 4096. Add "^ " quoting rule.
* Fixed decode of empty classes section, esp. for r13c3 and
r14.
* Keep IDBUFFER for old DXFs (r13-r14)
* Fixed SummaryInfo types from T to TU16, relevant for DXF
headers too.
* Add missing UTF-8 conversion in geojson for TEXT, MTEXT,
GEOPOSITIONMARKER.
- update to 0.11: * new programs dwgfilter, dxfwrite * improved file support for r2004+ (incomplete) * Add support for GeoJSON RFC794a godsend for the json importer) * API extensions and breaking changes
- update to 0.10.1: * Fixed dwg2SVG htmlescape overflows and off-by-ones * Removed direct usages of fprintf and stderr in the lib * Fuzzing fixes for dwg2SVG, dwgread * Fixed eed.raw leaks
- Update to release 0.10
* API breaking changes:
* Added a new int *isnewp argument to all dynapi utf8text
getters, if the returned string is freshly malloced or not.
* removed the UNKNOWN supertype, there are only UNKNOWN_OBJ and
UNKNOWN_ENT left, with common_entity_data.
* renamed BLOCK_HEADER.preview_data to preview,
preview_data_size to preview_size.
* renamed SHAPE.shape_no to style_id.
* renamed CLASS.wasazombie to is_zombie.
* Bugfixes:
* Harmonized INDXFB with INDXF, removed extra src/in_dxfb.c.
* Fixed encoding of added r2000 AUXHEADER address.
* Fixed EED encoding from dwgrewrite.
* Add several checks against
[CVE-2020-6609, boo#1160520], [CVE-2020-6610, boo#1160522],
[CVE-2020-6611, boo#1160523], [CVE-2020-6612, boo#1160524],
[CVE-2020-6613, boo#1160525], [CVE-2020-6614, boo#1160526],
[CVE-2020-6615, boo#1160527]