Commit Graph

5 Commits

Author SHA256 Message Date
a3723ee6c3 Accepting request 885790 from home:susnux:branches:GNOME:Factory
New stable release

OBS-URL: https://build.opensuse.org/request/show/885790
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=180
2021-04-17 08:18:29 +00:00
096f14f918 Accepting request 880930 from GNOME:Next
GNOME 40 - here we come

OBS-URL: https://build.opensuse.org/request/show/880930
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=176
2021-03-24 16:31:32 +00:00
92f74b2707 Accepting request 853729 from GNOME:Next
Update to 2.42.2 - CVE-2020-29385

OBS-URL: https://build.opensuse.org/request/show/853729
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=174
2020-12-08 08:58:27 +00:00
266284bc0b Accepting request 847339 from GNOME:Next
Update to 2.42.0

OBS-URL: https://build.opensuse.org/request/show/847339
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=172
2020-11-10 08:31:15 +00:00
31a2bc292e Accepting request 779402 from home:yfjiang:branches:GNOME:Factory
- A file tests/test-images/gif-test-suite/max-width.gif from the
  test suite is correctly identified by clamav to be a malicious
  BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part
  of the test suite to ensure it has no negative side effects.
  On SLE, the package is built with clamav scanning, which then
  prevents a successful build. This change repacks the source
  package to a password-protected zip to bypass the clamav scanning
  for SLE (bsc#1159337), with following update:
  + Download upstream tarball through source service
  + Add pre_checkin.sh to convert tarball to zip file
  + Update spec-file to use the zip file as main source

OBS-URL: https://build.opensuse.org/request/show/779402
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167
2020-02-27 11:55:09 +00:00