Mercurial > hg > orthanc
comparison NEWS @ 5443:8536b98eff2b
merge 'debug-telemis'
author | Alain Mazy <am@osimis.io> |
---|---|
date | Thu, 23 Nov 2023 17:00:01 +0100 |
parents | ac68a4383e51 |
children | 912565317b9a |
comparison
equal
deleted
inserted
replaced
5441:40112827c56f | 5443:8536b98eff2b |
---|---|
61 * Housekeeper: Introduced a 'sleep' to lower CPU usage when idle. | 61 * Housekeeper: Introduced a 'sleep' to lower CPU usage when idle. |
62 * Support multiple values in SpecificCharacterSet in C-Find answers: | 62 * Support multiple values in SpecificCharacterSet in C-Find answers: |
63 https://discourse.orthanc-server.org/t/c-find-fails-on-unknown-specific-character-set-iso-2022-ir-6-iso-2022-ir-100/3947 | 63 https://discourse.orthanc-server.org/t/c-find-fails-on-unknown-specific-character-set-iso-2022-ir-6-iso-2022-ir-100/3947 |
64 * When exporting a study archive, make sure to use the PatientName from the study and not from the patient | 64 * When exporting a study archive, make sure to use the PatientName from the study and not from the patient |
65 in case of PatientID collision. | 65 in case of PatientID collision. |
66 * DICOM C-Store: | |
67 - Avoid some unneccessary renegotiation of DICOM association. | |
68 - Force renegotiation in case no presentation context were accepted in previous association (we have | |
69 observed PACS that were not consistent in the accepted presentation contexts) | |
70 - Improved logging | |
66 * Upgraded dependencies for static builds: | 71 * Upgraded dependencies for static builds: |
67 - boost 1.83.0 | 72 - boost 1.83.0 |
68 * Upgraded minizip library to stay away from CVE-2023-45853 although Orthanc is likely not affected since zip | 73 * Upgraded minizip library to stay away from CVE-2023-45853 although Orthanc is likely not affected since zip |
69 filenames are based on DICOM Tag values whose length is limited in size. | 74 filenames are based on DICOM Tag values whose length is limited in size. |
70 Great thanks to James Addison for notifying us about the vulnerability and patch to apply ! | 75 Great thanks to James Addison for notifying us about the vulnerability and patch to apply ! |