Update dependency Magick.NET-Q8-x64 to 14.10.3 #272

Open
professeur-chen wants to merge 1 commit from renovate/magick.net-q8-x64-14.x into trunk
Collaborator

This PR contains the following updates:

Package Type Update Change
Magick.NET-Q8-x64 nuget patch 14.10.214.10.3

⚠️ Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

dlemstra/Magick.NET (Magick.NET-Q8-x64)

v14.10.3: Magick.NET 14.10.3

Compare Source

Library updates:
  • ImageMagick 7.1.2-15 (2026-02-22)
  • gdk-pixbuf 2.44.5 (2026-01-29)
  • harfbuzz 12.3.2 (2026-01-24)
  • libheif 1.21.2 (2026-01-16)
  • libjxl 0.11.2 (2026-02-10)
  • libpng 1.6.55 (2026-02-09)
  • libraqm 0.10.4 (2026-02-05)
  • openjph 0.26.3 (2026-02-17)
  • zlib 1.3.2 (2026-02-17)

Full Changelog: https://github.com/dlemstra/Magick.NET/compare/14.10.2...14.10.3


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [Magick.NET-Q8-x64](https://github.com/dlemstra/Magick.NET) | nuget | patch | `14.10.2` → `14.10.3` | --- > ⚠️ **Warning** > > Some dependencies could not be looked up. Check the Dependency Dashboard for more information. --- ### Release Notes <details> <summary>dlemstra/Magick.NET (Magick.NET-Q8-x64)</summary> ### [`v14.10.3`](https://github.com/dlemstra/Magick.NET/releases/tag/14.10.3): Magick.NET 14.10.3 [Compare Source](https://github.com/dlemstra/Magick.NET/compare/14.10.2...14.10.3) ##### Related changes in ImageMagick since the last release of Magick.NET: - Fixed OpenCL initialization ([#&#8203;1954](https://github.com/dlemstra/Magick.NET/issues/1954)) - Heap buffer over-read in WaveletDenoise with small images (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qpgx-jfcq-r59f>) - Possible infinite loop in JPEG encoder when using `jpeg:extent` (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-gwr3-x37h-h84v>) - Infinite loop when writing IPTCTEXT leads to denial of service via crafted profile (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v994-63cg-9wj3>) - Invalid MSL <map> can result in a use after free (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-w8mw-frc6-r7m8>) - Out of bounds read in djvu decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r99p-5442-q2x2>) - Memory allocation with excessive without limits in the internal SVG decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v7g2-m8c5-mf84>) - Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-7355-pwx2-pm84>) - Heap overflow in sun decoder on 32-bit systems can result in out of bounds write (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6j5f-24fw-pqp4>) - Code injection in various encoders (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rw6c-xp26-225v>) - Global Buffer Overflow (OOB Read) via Negative Pixel Index in UIL and XPM Writer (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vpxv-r9pg-7gpr>) - Heap-buffer-overflow via signed integer overflow in `WriteUHDRImage` when writing UHDR images with large dimensions (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vhqj-f5cj-9x8h>) - Memory leak of watermark Image object in ReadSTEGANOImage on multiple error/early-return paths (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-g2pr-qxjg-7r2w>) - NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw\.c) (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-p33r-fqw2-rqmm>) - Possible memory leak in ASHLAR encoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-gm37-qx7w-p258>) - Policy bypass through path traversal allows reading restricted content despite secured policy (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8jvj-p28h-9gm7>) - Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xwc6-v6g8-pw2h>) - Heap buffer overflow in YUV 4:2:2 decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mqfc-82jx-3mr2>) - Heap buffer over-read in MAP image decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-42p5-62qq-mmh7>) - NULL Pointer Dereference in ClonePixelCacheRepository via crafted image (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-p863-5fgm-rgq4>) - Division-by-Zero in YUV sampling factor validation leads to crash (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-543g-8grm-9cw6>) - Stack buffer overflow in FTXT reader via oversized integer field (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-72hf-fj62-w6j4>) - MSL image stack index not refreshed leading to leaked images (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-782x-jh29-9mf7>) - MSL attribute stack buffer overflow leads to out of bounds write (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-3mwp-xqp2-q6ph>) - Memory leak in msl encoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-gxcx-qjqp-8vjw>) - Memory Leak in coders/ashlar.c (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xgm3-v4r9-wfgm>) - Signed Integer Overflow in ImageMagick SIXEL Decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xg29-8ghv-v4xr>) - MSL: Stack overflow in ProcessMSLScript (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8mpr-6xr2-chhc>) - Heap Out-of-Bounds Read in DCM Decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pmq6-8289-hx3v>) - Out of bounds read in multiple coders that read raw pixel data (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-jv4p-gjwq-9r2j>) - Use After Free (CWE-416) in MSLStartElement in MSL decoder (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fwqw-2x5x-w566>) - Possible Heap Information Disclosure in PSD ZIP Decompression (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-96pc-27rx-pr36>) - Converting multi-layer nested MVG to SVG can cause DoS (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wg3g-gvx5-2pmv>) - An infinite loop vulnerability when parsing a PCD file (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pqgj-2p96-rx85>) - Heap overflow in pcd decoder leads to out of bounds read (<https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wrhr-rf8j-r842>) ##### Library updates: - ImageMagick 7.1.2-15 (2026-02-22) - gdk-pixbuf 2.44.5 (2026-01-29) - harfbuzz 12.3.2 (2026-01-24) - libheif 1.21.2 (2026-01-16) - libjxl 0.11.2 (2026-02-10) - libpng 1.6.55 (2026-02-09) - libraqm 0.10.4 (2026-02-05) - openjph 0.26.3 (2026-02-17) - zlib 1.3.2 (2026-02-17) **Full Changelog**: <https://github.com/dlemstra/Magick.NET/compare/14.10.2...14.10.3> </details> --- ### Configuration 📅 **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR has been generated by [Renovate Bot](https://github.com/renovatebot/renovate). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My4wLjYiLCJ1cGRhdGVkSW5WZXIiOiI0My4wLjYiLCJ0YXJnZXRCcmFuY2giOiJ0cnVuayIsImxhYmVscyI6W119-->
Update dependency Magick.NET-Q8-x64 to 14.10.3
All checks were successful
ci/woodpecker/push/workflow Pipeline was successful
ci/woodpecker/pr/workflow Pipeline was successful
73f551e8d1
All checks were successful
ci/woodpecker/push/workflow Pipeline was successful
ci/woodpecker/pr/workflow Pipeline was successful
This pull request can be merged automatically.
You are not authorized to merge this pull request.
View command line instructions

Checkout

From your project repository, check out a new branch and test the changes.
git fetch -u origin renovate/magick.net-q8-x64-14.x:renovate/magick.net-q8-x64-14.x
git switch renovate/magick.net-q8-x64-14.x

Merge

Merge the changes and update on Forgejo.

Warning: The "Autodetect manual merge" setting is not enabled for this repository, you will have to mark this pull request as manually merged afterwards.

git switch trunk
git merge --no-ff renovate/magick.net-q8-x64-14.x
git switch renovate/magick.net-q8-x64-14.x
git rebase trunk
git switch trunk
git merge --ff-only renovate/magick.net-q8-x64-14.x
git switch renovate/magick.net-q8-x64-14.x
git rebase trunk
git switch trunk
git merge --no-ff renovate/magick.net-q8-x64-14.x
git switch trunk
git merge --squash renovate/magick.net-q8-x64-14.x
git switch trunk
git merge --ff-only renovate/magick.net-q8-x64-14.x
git switch trunk
git merge renovate/magick.net-q8-x64-14.x
git push origin trunk
Sign in to join this conversation.
No reviewers
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
l4p1n-bot/bot!272
No description provided.