libtiff/libtiff.spec

273 lines
7.1 KiB
RPMSpec
Raw Normal View History

2019-09-30 10:58:29 -04:00
Name: libtiff
Version: 4.3.0
Release: 17
2019-09-30 10:58:29 -04:00
Summary: TIFF Library and Utilities
License: libtiff
URL: https://www.simplesystems.org/libtiff/
Source0: https://download.osgeo.org/libtiff/tiff-%{version}.tar.gz
2022-02-23 10:31:34 +08:00
Patch6000: backport-CVE-2022-0561.patch
Patch6001: backport-CVE-2022-0562.patch
2022-03-08 19:10:06 +08:00
Patch6002: backport-0001-CVE-2022-22844.patch
Patch6003: backport-0002-CVE-2022-22844.patch
Patch6004: backport-0003-CVE-2022-22844.patch
2022-03-17 11:09:27 +08:00
Patch6005: backport-CVE-2022-0891.patch
2022-03-28 16:49:33 +08:00
Patch6006: backport-CVE-2022-0907.patch
Patch6007: backport-CVE-2022-0908.patch
2022-03-29 15:56:57 +08:00
Patch6008: backport-CVE-2022-0865.patch
2022-04-01 17:15:03 +08:00
Patch6009: backport-CVE-2022-0909.patch
Patch6010: backport-CVE-2022-0924.patch
2022-05-18 14:44:19 +08:00
Patch6011: backport-CVE-2022-1355.patch
2022-06-14 14:58:29 +08:00
Patch6012: backport-0001-CVE-2022-1622-CVE-2022-1623.patch
Patch6013: backport-0002-CVE-2022-1622-CVE-2022-1623.patch
2022-07-05 15:14:37 +08:00
Patch6014: backport-CVE-2022-1354.patch
Patch6015: backport-CVE-2022-2867-CVE-2022-2868-CVE-2022-2869.patch
2022-02-23 10:31:34 +08:00
2022-04-02 15:29:47 +08:00
Patch9000: fix-raw2tiff-floating-point-exception.patch
2019-09-30 10:58:29 -04:00
BuildRequires: gcc gcc-c++ zlib-devel libjpeg-devel jbigkit-devel
BuildRequires: libtool automake autoconf pkgconfig
2019-09-30 10:58:29 -04:00
%description
2019-11-06 19:40:17 +08:00
This %{name} provides support for the Tag Image File Format (TIFF), a widely
used format for storing image data. The latest version of the TIFF specification
2019-09-30 10:58:29 -04:00
is available on-line in several different formats.And contains command-line programs
for manipulating TIFF format image files using the libtiff library.
%package devel
Summary: Development files for %{name} library
Requires: %{name} = %{version}-%{release} pkgconfig
%description devel
This package contains the header files and documentation necessary for developing programs
which will manipulate TIFF format image files using the libtiff library.
%package static
Summary: Static TIFF image format file library
Requires: %{name}-devel%{?_isa} = %{version}-%{release}
%description static
the libtiff-static package contains the syatically linkable version of libtiff.
Linking to static libraries is discouraged for most applications,but it is necessary for some boot packages.
%package tools
Summary: Command-line utility programs for manipulating TIFF files
Requires: %{name}%{?_isa} = %{version}-%{release}
%description tools
This package contains command-line programs for manipulating TIFF format image files using the libtiff library.
2019-09-30 10:58:29 -04:00
%package_help
%prep
%autosetup -n tiff-%{version} -p1
2019-09-30 10:58:29 -04:00
libtoolize --force --copy
aclocal -I . -I m4
automake --add-missing --copy
autoconf
autoheader
%build
export CFLAGS="%{optflags} -fno-strict-aliasing"
2019-11-06 19:40:17 +08:00
%configure --enable-ld-version-script
2019-09-30 10:58:29 -04:00
%make_build
%install
%make_install
%delete_la
rm -rf %{buildroot}/%{_datadir}/doc/
rm -f %{buildroot}/%{_bindir}/tiffgt
case `uname -i` in
x86_64 )
wordsize="64"
;;
*)
wordsize=""
2019-11-06 19:40:17 +08:00
;;
2019-09-30 10:58:29 -04:00
esac
if test -n "$wordsize"
then
mv %{buildroot}/%{_includedir}/tiffconf.h %{buildroot}/%{_includedir}/tiffconf-$wordsize.h
cat >%{buildroot}/%{_includedir}/tiffconf.h <<EOF
#ifndef TIFFCONF_H_MULTILIB
#define TIFFCONF_H_MULTILIB
#include <bits/wordsize.h>
#if __WORDSIZE == 32
# include "tiffconf-32.h"
#elif __WORDSIZE == 64
# include "tiffconf-64.h"
#else
# error "unexpected value for __WORDSIZE macro"
#endif
2019-11-06 19:40:17 +08:00
#endif
2019-09-30 10:58:29 -04:00
EOF
fi
%ldconfig_scriptlets
%check
make check
find html -name 'Makefile*' | xargs rm
%files
%defattr(-,root,root)
2019-11-06 19:40:17 +08:00
%license COPYRIGHT
%doc README.md
2019-09-30 10:58:29 -04:00
%{_libdir}/*.so.*
%files devel
%defattr(-,root,root)
%{_includedir}/*
%{_libdir}/*.so
%{_libdir}/pkgconfig/
%files static
%{_libdir}/*.a
%files tools
%{_bindir}/*
%{_mandir}/man1/*
2019-09-30 10:58:29 -04:00
%files help
%defattr(-,root,root)
%{_mandir}/man*
%doc RELEASE-DATE VERSION
2019-11-06 19:40:17 +08:00
%doc TODO ChangeLog html
%exclude %{_mandir}/man1/*
2019-09-30 10:58:29 -04:00
%exclude %{_datadir}/html/man/tiffgt.1.html
%changelog
* Tue Aug 23 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-17
- fix CVE-2022-2867,CVE-2022-2868,CVE-2022-2869
2022-07-05 15:14:37 +08:00
* Tue Jul 05 2022 zhouwenpei <zhouwenpei1@h-partners.com> - 4.3.0-16
- fix CVE-2022-1354
2022-06-14 14:58:29 +08:00
* Tue Jun 14 2022 wuchaochao <cyanrose@yeah.net> - 4.3.0-15
- fix CVE-2022-1622 and CVE-2022-1623
* Sat Jun 11 2022 wangkerong <wangkerong@h-partners.com> - 4.3.0-14
- delete macro in changelog
2022-05-18 14:44:19 +08:00
* Wed May 18 2022 liuyumeng <liuyumeng5@h-partners.com> - 4.3.0-13
- fix CVE-2022-1355
2022-04-02 15:29:47 +08:00
* Fri Apr 01 2022 dongyuzhen <dongyuzhen@h-partners.com> - 4.3.0-12
2022-04-01 17:15:03 +08:00
- fix CVE-2022-0909,CVE-2022-0924
2022-04-02 15:29:47 +08:00
* Tue Mar 29 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-11
2022-03-29 15:56:57 +08:00
- fix CVE-2022-0865
2022-04-02 15:29:47 +08:00
* Mon Mar 28 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-10
2022-03-28 16:49:33 +08:00
- fix CVE-2022-0907
2022-04-02 15:29:47 +08:00
* Tue Mar 22 2022 yangcheng <yangcheng87@h-partners.com> - 4.3.0-9
2022-03-22 16:02:18 +08:00
- Type:cve
- ID:CVE-2022-0908
- SUG:NA
- DESC:fix CVE-2022-0908
2022-04-02 15:29:47 +08:00
* Thu Mar 17 2022 wangkerong <wangkerong@h-partners.com> - 4.3.0-8
2022-03-17 11:09:27 +08:00
- Type:cve
- ID:CVE-2022-0891
- SUG:NA
- DESC:fix CVE-2022-0891
2022-04-02 15:29:47 +08:00
* Tue Mar 08 2022 dongyuzhen <dongyuzhen@h-partners.com> - 4.3.0-7
2022-03-08 19:10:06 +08:00
- Type:cves
- ID:CVE-2022-22844
- SUG:NA
- DESC:fix CVE-2022-22844
2022-04-02 15:29:47 +08:00
* Wed Feb 23 2022 liuyumeng <liuyumeng5@h-partners.com> - 4.3.0-6
2022-02-23 10:31:34 +08:00
- Type:cves
2022-04-02 15:29:47 +08:00
- ID:CVE-2022-0561 CVE-2022-0562
2022-02-23 10:31:34 +08:00
- SUG:NA
- DESC:fix CVE-2022-0561 CVE-2022-0562
2022-04-02 15:29:47 +08:00
* Fri Dec 24 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-5
- fix the dependency package connot find TIFF_SSIZE_T in tiffio.h
* Wed Dec 15 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-4
- fix raw2tiff floating point exception
* Mon Dec 13 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-3
- fix incorrect writing when unpacking in spec
* Mon Dec 06 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-2
- fix the date in the changelog
2021-12-13 14:23:19 +08:00
* Fri Dec 03 2021 liuyumeng <liuyumeng5@huawei.com> - 4.3.0-1
- update to libtiff-4.3.0-1
* Fri Jul 30 2021 chenyanpanHW <chenyanpan@huawei.com> - 4.2.0-2
- DESC: delete -S git from autosetup, and delete BuildRequires git
2021-01-27 14:22:34 +08:00
* Wed Jan 27 2021 hanhui <hanhui15@huawei.com> - 4.2.0-1
- Type: enhancement
- ID: NA
- SUG: NA
- DESC: update to 4.2.0
2020-01-07 23:56:46 +08:00
* Tue Jan 7 2020 openEuler Buildteam <buildteam@openeuler.org> - 4.1.0-1
- update to 4.1.0
2019-11-06 19:40:17 +08:00
* Mon Oct 21 2019 openEuler Buildteam <buildteam@openeuler.org> - 4.0.10-2
- Type:enhancement
- Id:NA
- SUG:NA
- DESC:modify the location of COPYRIGHT
2019-09-30 10:58:29 -04:00
* Fri Sep 06 2019 openEuler Buildteam <buildteam@openeuler.org> - 4.0.10-1
- Type:Enhance
- ID:NA
- SUG:NA
- DESC: openEuler Debranding
* Mon Aug 19 2019 cangyi<cangyi@huawei.com> - 4.0.9-11.h6
- Type:bugfix
- ID:NA
- SUG:NA
- DESC:format patches
* Fri Aug 09 2019 zhangyujing<zhangyujing1@huawei.com> - 4.0.9-11.h5
- Type:cves
- ID:CVE-2018-10779
- SUG:NA
- DESC:fix CVE-2018-10779
* Wed Jul 31 2019 shenyangyang<shenyangyang4@huawei.com> - 4.0.9-11.h4
- Type:NA
- ID:NA
- SUG:NA
- DESC:openEuler Debrading
* Mon Jul 15 2019 wangchan<wangchan9@huawei.com> - 4.0.9-11.h3
- Type:cves
- ID:CVE-2017-17095
- SUG:NA
- DESC:fix CVE-2017-17095
* Mon Apr 29 2019 yuejiayan<yuejiayan@huawei.com> - 4.0.9-11.h2
- Type:cves
- ID:CVE-2018-19210 CVE-2019-6128
- SUG:NA
- DESC:fix above cves
* Sun Apr 07 2019 wenjun<wenjun8@huawei.com> - 4.0.9-11.h1
- Type:cves
- ID:CVE-2018-18557 CVE-2018-17101 CVE-2018-17100 CVE-2018-12900 CVE-2018-18661
- SUG:NA
- DESC:fix above cves
* Fri Jul 13 2018 shenyangyang<shenyangyang4@huawei.com> - 4.0.9-11
- Package Initialization