Mercurial > hg > orthanc
comparison NEWS @ 5438:7a20ee948676 debug-telemis
Added a new 'Telemis' manufacturer for DicomModalities
author | Alain Mazy <am@osimis.io> |
---|---|
date | Wed, 22 Nov 2023 12:57:07 +0100 |
parents | 4be5f117aa0d |
children | ac68a4383e51 |
comparison
equal
deleted
inserted
replaced
5437:85da6dcd0e08 | 5438:7a20ee948676 |
---|---|
61 * Housekeeper: Introduced a 'sleep' to lower CPU usage when idle. | 61 * Housekeeper: Introduced a 'sleep' to lower CPU usage when idle. |
62 * Support multiple values in SpecificCharacterSet in C-Find answers: | 62 * Support multiple values in SpecificCharacterSet in C-Find answers: |
63 https://discourse.orthanc-server.org/t/c-find-fails-on-unknown-specific-character-set-iso-2022-ir-6-iso-2022-ir-100/3947 | 63 https://discourse.orthanc-server.org/t/c-find-fails-on-unknown-specific-character-set-iso-2022-ir-6-iso-2022-ir-100/3947 |
64 * When exporting a study archive, make sure to use the PatientName from the study and not from the patient | 64 * When exporting a study archive, make sure to use the PatientName from the study and not from the patient |
65 in case of PatientID collision. | 65 in case of PatientID collision. |
66 * Added a new 'Telemis' manufacturer for DicomModalities. This forces a new DICOM renegociation in case the | |
67 SopClassUid+TransferSyntax was rejected in the current association. | |
66 * Upgraded dependencies for static builds: | 68 * Upgraded dependencies for static builds: |
67 - boost 1.83.0 | 69 - boost 1.83.0 |
68 * Upgraded minizip library to stay away from CVE-2023-45853 although Orthanc is likely not affected since zip | 70 * Upgraded minizip library to stay away from CVE-2023-45853 although Orthanc is likely not affected since zip |
69 filenames are based on DICOM Tag values whose length is limited in size. | 71 filenames are based on DICOM Tag values whose length is limited in size. |
70 Great thanks to James Addison for notifying us about the vulnerability and patch to apply ! | 72 Great thanks to James Addison for notifying us about the vulnerability and patch to apply ! |