Skip to content

Commit 1fc7280

Browse files
Bump the nuget group with 1 update (#285)
Updated [Magick.NET-Q8-AnyCPU](https://github.com/dlemstra/Magick.NET) from 14.10.2 to 14.10.3. <details> <summary>Release notes</summary> _Sourced from [Magick.NET-Q8-AnyCPU's releases](https://github.com/dlemstra/Magick.NET/releases)._ ## 14.10.3 ### Related changes in ImageMagick since the last release of Magick.NET: - Fixed OpenCL initialization (#​1954) - Heap buffer over-read in WaveletDenoise with small images (GHSA-qpgx-jfcq-r59f) - Possible infinite loop in JPEG encoder when using `jpeg:extent` (GHSA-gwr3-x37h-h84v) - Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (GHSA-v994-63cg-9wj3) - Invalid MSL <map> can result in a use after free (GHSA-w8mw-frc6-r7m8) - Out of bounds read in djvu decoder (GHSA-r99p-5442-q2x2) - Memory allocation with excessive without limits in the internal SVG decoder (GHSA-v7g2-m8c5-mf84) - Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder (GHSA-7355-pwx2-pm84) - Heap overflow in sun decoder on 32-bit systems can result in out of bounds write (GHSA-6j5f-24fw-pqp4) - Code injection in various encoders (GHSA-rw6c-xp26-225v) - Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer (GHSA-vpxv-r9pg-7gpr) - Heap-buffer-overflow via signed integer overflow in `WriteUHDRImage` when writing UHDR images with large dimensions (GHSA-vhqj-f5cj-9x8h) - Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths (GHSA-g2pr-qxjg-7r2w) - NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c) (GHSA-p33r-fqw2-rqmm) - Possible memory leak in ASHLAR encoder (GHSA-gm37-qx7w-p258) - Policy bypass through path traversal allows reading restricted content despite secured policy (GHSA-8jvj-p28h-9gm7) - Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access (GHSA-xwc6-v6g8-pw2h) - Heap buffer overflow in YUV 4:2:2 decoder (GHSA-mqfc-82jx-3mr2) - Heap buffer over-read in MAP image decoder (GHSA-42p5-62qq-mmh7) - NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (GHSA-p863-5fgm-rgq4) - Division-by-Zero in YUV sampling factor validation leads to crash (GHSA-543g-8grm-9cw6) - Stack buffer overflow in FTXT reader via oversized integer field (GHSA-72hf-fj62-w6j4) - MSL image stack index not refreshed leading to leaked images (GHSA-782x-jh29-9mf7) - MSL attribute stack buffer overflow leads to out of bounds write (GHSA-3mwp-xqp2-q6ph) - Memory leak in msl encoder (GHSA-gxcx-qjqp-8vjw) - Memory Leak in coders/ashlar.c (GHSA-xgm3-v4r9-wfgm) - Signed Integer Overflow in ImageMagick SIXEL Decoder (GHSA-xg29-8ghv-v4xr) - MSL: Stack overflow in ProcessMSLScript (GHSA-8mpr-6xr2-chhc) - Heap Out-of-Bounds Read in DCM Decoder (GHSA-pmq6-8289-hx3v) - Out of bounds read in multiple coders that read raw pixel data (GHSA-jv4p-gjwq-9r2j) - Use After Free (CWE-416) in MSLStartElement in MSL decoder (GHSA-fwqw-2x5x-w566) - Possible Heap Information Disclosure in PSD ZIP Decompression (GHSA-96pc-27rx-pr36) - Converting multi-layer nested MVG to SVG can cause DoS (GHSA-wg3g-gvx5-2pmv) - An infinite loop vulnerability when parsing a PCD file (GHSA-pqgj-2p96-rx85) - Heap overflow in pcd decoder leads to out of bounds read (GHSA-wrhr-rf8j-r842) ### Library updates: - ImageMagick 7.1.2-15 (2026-02-22) - gdk-pixbuf 2.44.5 (2026-01-29) - harfbuzz 12.3.2 (2026-01-24) - libheif 1.21.2 (2026-01-16) - libjxl 0.11.2 (2026-02-10) - libpng 1.6.55 (2026-02-09) - libraqm 0.10.4 (2026-02-05) - openjph 0.26.3 (2026-02-17) - zlib 1.3.2 (2026-02-17) **Full Changelog**: dlemstra/Magick.NET@14.10.2...14.10.3 Commits viewable in [compare view](dlemstra/Magick.NET@14.10.2...14.10.3). </details> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=Magick.NET-Q8-AnyCPU&package-manager=nuget&previous-version=14.10.2&new-version=14.10.3)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore <dependency name> major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore <dependency name> minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore <dependency name>` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore <dependency name>` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore <dependency name> <ignore condition>` will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/mlapaglia/OpenAlprWebhookProcessor/network/alerts). </details> Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
1 parent 60aa78d commit 1fc7280

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

OpenAlprWebhookProcessor.Server/OpenAlprWebhookProcessor.Server.csproj

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
<PackageReference Include="Flurl.Http" Version="4.0.2" />
4040
<PackageReference Include="FluentValidation.DependencyInjectionExtensions" Version="12.1.1" />
4141
<PackageReference Include="Lib.AspNetCore.WebPush" Version="2.2.2" />
42-
<PackageReference Include="Magick.NET-Q8-AnyCPU" Version="14.10.2" />
42+
<PackageReference Include="Magick.NET-Q8-AnyCPU" Version="14.10.3" />
4343
<PackageReference Include="Mediator.Abstractions" Version="3.0.*-*" />
4444
<PackageReference Include="Mediator.SourceGenerator" Version="3.0.*-*">
4545
<PrivateAssets>all</PrivateAssets>

0 commit comments

Comments
 (0)