Projects
Mega:24.03:SP1:Everything
libtiff
_service:tar_scm:libtiff.spec
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:tar_scm:libtiff.spec of Package libtiff
Name: libtiff Version: 4.6.0 Release: 3 Summary: TIFF Library and Utilities License: libtiff URL: https://libtiff.gitlab.io/libtiff/ Source0: https://download.osgeo.org/libtiff/tiff-%{version}.tar.gz Patch6000: backport-CVE-2023-6228.patch Patch6001: backport-0001-CVE-2023-6277.patch Patch6002: backport-0002-CVE-2023-6277.patch Patch6003: backport-0003-CVE-2023-6277.patch Patch6004: backport-0004-CVE-2024-7006.patch BuildRequires: gcc gcc-c++ zlib-devel libjpeg-devel jbigkit-devel BuildRequires: libtool automake autoconf pkgconfig %description This %{name} provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. The latest version of the TIFF specification is available on-line in several different formats.And contains command-line programs for manipulating TIFF format image files using the libtiff library. %package devel Summary: Development files for %{name} library Requires: %{name} = %{version}-%{release} pkgconfig %description devel This package contains the header files and documentation necessary for developing programs which will manipulate TIFF format image files using the libtiff library. %package static Summary: Static TIFF image format file library Requires: %{name}-devel%{?_isa} = %{version}-%{release} %description static the libtiff-static package contains the syatically linkable version of libtiff. Linking to static libraries is discouraged for most applications,but it is necessary for some boot packages. %package tools Summary: Command-line utility programs for manipulating TIFF files Requires: %{name}%{?_isa} = %{version}-%{release} %description tools This package contains command-line programs for manipulating TIFF format image files using the libtiff library. %package_help %prep %autosetup -n tiff-%{version} -p1 libtoolize --force --copy aclocal -I . -I m4 automake --add-missing --copy autoconf autoheader %build export CFLAGS="%{optflags} -fno-strict-aliasing" %configure --enable-ld-version-script %make_build %install %make_install %delete_la rm -rf %{buildroot}/%{_datadir}/doc/ rm -f %{buildroot}/%{_bindir}/tiffgt case `uname -i` in x86_64 ) wordsize="64" ;; *) wordsize="" ;; esac if test -n "$wordsize" then mv %{buildroot}/%{_includedir}/tiffconf.h %{buildroot}/%{_includedir}/tiffconf-$wordsize.h cat >%{buildroot}/%{_includedir}/tiffconf.h <<EOF #ifndef TIFFCONF_H_MULTILIB #define TIFFCONF_H_MULTILIB #include <bits/wordsize.h> #if __WORDSIZE == 32 # include "tiffconf-32.h" #elif __WORDSIZE == 64 # include "tiffconf-64.h" #else # error "unexpected value for __WORDSIZE macro" #endif #endif EOF fi %ldconfig_scriptlets %check make check find doc -name 'Makefile*' | xargs rm %files %defattr(-,root,root) %license LICENSE.md %doc README.md %{_libdir}/*.so.* %files devel %defattr(-,root,root) %{_includedir}/* %{_libdir}/*.so %{_libdir}/pkgconfig/ %files static %{_libdir}/*.a %files tools %{_bindir}/* %{_mandir}/man1/* %files help %defattr(-,root,root) %{_mandir}/man* %doc RELEASE-DATE VERSION %doc TODO ChangeLog doc %exclude %{_mandir}/man1/* %changelog * Tue Aug 13 2024 wangguochun <wangguochun@kylinos.cn> - 4.6.0-3 - fix CVE-2024-7006 * Mon Jul 22 2024 xuguangmin <xuguangmin@kylinos.cn> - 4.6.0-2 - Fix incorrect dates in the ChangeLog section of the spec file. * Wed Dec 27 2023 lvgenggeng <lvgenggeng@uniontech.com> - 4.6.0-1 - bump to 4.6.0 * Wed Nov 29 2023 liningjie <liningjie@xfusion.com> - 4.5.1-4 - backport patch for fix CVE-2023-6277 issue * Sat Nov 25 2023 liningjie <liningjie@xfusion.com> - 4.5.1-3 - fix CVE-2023-6277 * Tue Nov 21 2023 liningjie <liningjie@xfusion.com> - 4.5.1-2 - fix CVE-2023-6228 * Mon Jul 24 2023 zhouwenpei <zhouwenpei1@h-partners.com> - 4.5.1-1 - update 4.5.1 * Thu Jul 13 2023 zhangpan <zhangpan103@h-partners.com> - 4.5.0-8 - fix CVE-2023-3576 * Tue Jul 04 2023 zhangpan <zhangpan103@h-partners.com> - 4.5.0-7 - fix CVE-2023-25433 CVE-2023-26966 CVE-2023-2908 * Sun Jun 25 2023 zhangpan <zhangpan103@h-partners.com> - 4.5.0-6 - fix CVE-2023-3316 * Thu Jun 15 2023 zhangpan <zhangpan103@h-partners.com> - 4.5.0-5 - fix CVE-2023-26965 * Wed May 24 2023 zhangpan <zhangpan103@h-partners.com> - 4.5.0-4 - fix CVE-2023-2731 * Mon Feb 20 2023 zhouwenpei <zhouwenpei1@h-partners.com> - 4.5.0-3 - delete old so files * Thu Feb 16 2023 zhouwenpei <zhouwenpei1@h-partners.com> - 4.5.0-2 - fix CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799, - fix CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804 * Thu Feb 09 2023 zhouwenpei <zhouwenpei1@h-partners.com> - 4.5.0-1 - update to 4.5.0 * Sun Jan 29 2023 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-22 - Type:cve - ID:CVE-2022-48281 - SUG:NA - DESC:fix CVE-2022-48281 * Thu Nov 17 2022 qisen <qisen@huawei.com> - 4.3.0-21 - Type:cve - ID:CVE-2022-3970 - SUG:NA - DESC:fix CVE-2022-3970 * Wed Oct 26 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-20 - fix CVE-2022-3570,CVE-2022-3597,CVE-2022-3598,CVE-2022-3599,CVE-2022-3626,CVE-2022-3627 * Mon Oct 17 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-19 - fix CVE-2022-2056,CVE-2022-2057,CVE-2022-2058 * Tue Sep 13 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-18 - fix CVE-2022-2953,CVE-2022-2519,CVE-2022-2520,CVE-2022-2521 * Tue Aug 23 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-17 - fix CVE-2022-2867,CVE-2022-2868,CVE-2022-2869 * Tue Jul 05 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-16 - fix CVE-2022-1354 * Tue Jun 14 2022 wuchaochao <cyanrose@yeah.net> - 4.3.0-15 - fix CVE-2022-1622 and CVE-2022-1623 * Sat Jun 11 2022 wangkerong <wangkerong@h-partners.com> - 4.3.0-14 - delete macro in changelog * Wed May 18 2022 liuyumeng <liuyumeng5@h-partners.com> - 4.3.0-13 - fix CVE-2022-1355 * Fri Apr 01 2022 dongyuzhen <dongyuzhen@h-partners.com> - 4.3.0-12 - fix CVE-2022-0909,CVE-2022-0924 * Tue Mar 29 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-11 - fix CVE-2022-0865 * Mon Mar 28 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-10 - fix CVE-2022-0907 * Tue Mar 22 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-9 - Type:cve - ID:CVE-2022-0908 - SUG:NA - DESC:fix CVE-2022-0908 * Thu Mar 17 2022 wangkerong <wangkerong@h-partners.com> - 4.3.0-8 - Type:cve - ID:CVE-2022-0891 - SUG:NA - DESC:fix CVE-2022-0891 * Tue Mar 08 2022 dongyuzhen <dongyuzhen@h-partners.com> - 4.3.0-7 - Type:cves - ID:CVE-2022-22844 - SUG:NA - DESC:fix CVE-2022-22844 * Wed Feb 23 2022 liuyumeng <liuyumeng5@h-partners.com> - 4.3.0-6 - Type:cves - ID:CVE-2022-0561 CVE-2022-0562 - SUG:NA - DESC:fix CVE-2022-0561 CVE-2022-0562 * Fri Dec 24 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-5 - fix the dependency package connot find TIFF_SSIZE_T in tiffio.h * Wed Dec 15 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-4 - fix raw2tiff floating point exception * Mon Dec 13 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-3 - fix incorrect writing when unpacking in spec * Mon Dec 06 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-2 - fix the date in the changelog * Fri Dec 03 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-1 - update to libtiff-4.3.0-1 * Fri Jul 30 2021 chenyanpanHW <chenyanpan@huawei.com> - 4.2.0-2 - DESC: delete -S git from autosetup, and delete BuildRequires git * Wed Jan 27 2021 hanhui <hanhui15@huawei.com> - 4.2.0-1 - Type: enhancement - ID: NA - SUG: NA - DESC: update to 4.2.0 * Tue Jan 7 2020 openEuler Buildteam <buildteam@openeuler.org> - 4.1.0-1 - update to 4.1.0 * Mon Oct 21 2019 openEuler Buildteam <buildteam@openeuler.org> - 4.0.10-2 - Type:enhancement - Id:NA - SUG:NA - DESC:modify the location of COPYRIGHT * Fri Sep 06 2019 openEuler Buildteam <buildteam@openeuler.org> - 4.0.10-1 - Type:Enhance - ID:NA - SUG:NA - DESC: openEuler Debranding * Mon Aug 19 2019 cangyi<cangyi@huawei.com> - 4.0.9-11.h6 - Type:bugfix - ID:NA - SUG:NA - DESC:format patches * Fri Aug 09 2019 zhangyujing<zhangyujing1@huawei.com> - 4.0.9-11.h5 - Type:cves - ID:CVE-2018-10779 - SUG:NA - DESC:fix CVE-2018-10779 * Wed Jul 31 2019 shenyangyang<shenyangyang4@huawei.com> - 4.0.9-11.h4 - Type:NA - ID:NA - SUG:NA - DESC:openEuler Debrading * Mon Jul 15 2019 wangchan<wangchan9@huawei.com> - 4.0.9-11.h3 - Type:cves - ID:CVE-2017-17095 - SUG:NA - DESC:fix CVE-2017-17095 * Mon Apr 29 2019 yuejiayan<yuejiayan@huawei.com> - 4.0.9-11.h2 - Type:cves - ID:CVE-2018-19210 CVE-2019-6128 - SUG:NA - DESC:fix above cves * Sun Apr 07 2019 wenjun<wenjun8@huawei.com> - 4.0.9-11.h1 - Type:cves - ID:CVE-2018-18557 CVE-2018-17101 CVE-2018-17100 CVE-2018-12900 CVE-2018-18661 - SUG:NA - DESC:fix above cves * Fri Jul 13 2018 shenyangyang<shenyangyang4@huawei.com> - 4.0.9-11 - Package Initialization
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.
浙ICP备2022010568号-2