Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
tiff
tiff.spec
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File tiff.spec of Package tiff
# # spec file for package tiff # # Copyright (c) 2024 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via https://bugs.opensuse.org/ # %define asan_build 0 %define debug_build 0 Name: tiff Version: 4.0.9 Release: 0 Summary: Tools for Converting from and to the Tagged Image File Format License: HPND Group: Productivity/Graphics/Convertors URL: http://www.simplesystems.org/libtiff/ Source: http://download.osgeo.org/libtiff/tiff-%{version}.tar.gz Source2: README.SUSE Source3: baselibs.conf Patch0: tiff-4.0.3-seek.patch # http://bugzilla.maptools.org/show_bug.cgi?id=2442 Patch1: tiff-4.0.3-compress-warning.patch # Bring back the bmp2tiff tool Patch100: bmp2tiff-comeback.patch # Bring back the gif2tiff tool Patch101: gif2tiff-comeback.patch # Bring back the thumbnail and rgb2ycbcr tools Patch102: thumbnail_and_rgb2ycbcr-comeback.patch # Bring back the ras2tiff tool Patch103: ras2tiff-comeback.patch Patch104: tiff-CVE-2017-9935,17973,CVE-2018-17795.patch Patch105: tiff-4.0.9-bsc1081690-CVE-2018-5784.patch Patch106: tiff-CVE-2018-10963.patch Patch107: tiff-CVE-2017-18013.patch Patch108: tiff-CVE-2018-7456.patch Patch109: tiff-CVE-2017-11613,CVE-2018-16335,15209.patch Patch110: tiff-CVE-2018-8905.patch Patch111: tiff-CVE-2018-10779.patch Patch112: tiff-CVE-2017-17942,CVE-2016-5319.patch Patch113: tiff-CVE-2018-17100.patch Patch114: tiff-CVE-2018-17101.patch Patch115: tiff-CVE-2018-18661.patch Patch116: tiff-CVE-2018-18557.patch Patch117: tiff-CVE-2018-12900.patch Patch118: tiff-CVE-2018-17000,19210.patch Patch119: tiff-CVE-2019-6128.patch Patch120: tiff-CVE-2019-7663.patch Patch121: tiff-CVE-2016-5102.patch Patch122: tiff-CVE-2019-14973.patch Patch123: tiff-CVE-2020-35523.patch Patch124: tiff-CVE-2020-35524.patch Patch125: tiff-CVE-2020-19131.patch Patch126: tiff-CVE-2020-35521,CVE-2020-35522.patch Patch127: tiff-CVE-2022-22844.patch Patch128: tiff-CVE-2017-17095.patch Patch129: tiff-CVE-2019-17546.patch Patch130: tiff-CVE-2022-1056,CVE-2022-0891.patch Patch131: tiff-CVE-2022-0561,CVE-2022-34266.patch Patch132: tiff-CVE-2022-0562.patch Patch133: tiff-CVE-2022-0865.patch Patch134: tiff-CVE-2022-0909.patch Patch135: tiff-CVE-2022-0924.patch Patch136: tiff-CVE-2022-0908.patch Patch137: tiff-CVE-2022-2056,CVE-2022-2057,CVE-2022-2058.patch Patch138: tiff-CVE-2022-34526.patch Patch139: tiff-CVE-2022-2519,CVE-2022-2520,CVE-2022-2521.patch Patch140: tiff-CVE-2022-2867,CVE-2022-2868,CVE-2022-2869.patch Patch141: tiff-CVE-2022-3597,CVE-2022-3626,CVE-2022-3627.patch Patch142: tiff-CVE-2022-3599.patch Patch143: tiff-CVE-2022-3970.patch Patch144: tiff-CVE-2022-3598,3570.patch Patch145: tiff-CVE-2022-48281.patch Patch146: tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch Patch147: tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch Patch148: tiff-CVE-2023-38289.patch Patch149: tiff-CVE-2023-38288,CVE-2023-40745,CVE-2023-41175.patch Patch150: tiff-CVE-2023-3576.patch Patch151: tiff-CVE-2020-18768.patch Patch152: tiff-CVE-2023-26966.patch Patch153: tiff-CVE-2023-3618.patch Patch154: tiff-CVE-2023-2908.patch Patch155: tiff-CVE-2023-3316.patch Patch156: tiff-CVE-2023-2731.patch Patch157: tiff-CVE-2023-26965.patch Patch158: tiff-CVE-2022-40090.patch Patch159: tiff-CVE-2023-1916.patch Patch160: tiff-CVE-2023-52356.patch Patch161: tiff-CVE-2015-8668.patch Patch162: tiff-CVE-2023-3164.patch Patch163: tiff-CVE-2024-7006.patch BuildRequires: autoconf BuildRequires: automake BuildRequires: gcc-c++ BuildRequires: libjpeg-devel BuildRequires: libtool BuildRequires: zlib-devel BuildRoot: %{_tmppath}/%{name}-%{version}-build %if 0%{?suse_version} > 1030 BuildRequires: lzma-devel %endif %if 0%{?suse_version} <= 1000 BuildRequires: pkgconfig %endif %if 0%{?suse_version} > 1000 BuildRequires: pkg-config %endif # bug437293 %ifarch ppc64 Obsoletes: tiff-64bit %endif %if 0%{?suse_version} > 1210 BuildRequires: libjbig-devel %endif %description This package contains the library and support programs for the TIFF image format. %package -n libtiff5 Summary: The Tiff Library (with JPEG and compression support) Group: System/Libraries Provides: libtiff = %{version} # bug437293 %ifarch ppc64 Obsoletes: libtiff-64bit %endif # %description -n libtiff5 This package includes the tiff libraries. To link a program with libtiff, you will have to add -ljpeg and -lz to include the necessary libjpeg and libz in the linking process. %package -n libtiff-devel Summary: Development Tools for Programs which will use the libtiff Library Group: Development/Libraries/C and C++ Requires: glibc-devel Requires: libstdc++-devel Requires: libtiff5 = %{version} # bug437293 %ifarch ppc64 Obsoletes: tiff-devel-64bit %endif # %description -n libtiff-devel This package contains the header files and static libraries for developing programs which will manipulate TIFF format image files using the libtiff library. %prep %setup -q %patch0 -p1 %patch1 -p1 %patch100 -p1 %patch101 -p1 %patch102 -p1 %patch103 -p1 %patch104 -p1 %patch105 -p1 %patch106 -p1 %patch107 -p1 %patch108 -p1 %patch109 -p1 %patch110 -p1 %patch111 -p1 %patch112 -p1 %patch113 -p1 %patch114 -p1 %patch115 -p1 %patch116 -p1 %patch117 -p1 %patch118 -p1 %patch119 -p1 %patch120 -p1 %patch121 -p1 %patch122 -p1 %patch123 -p1 %patch124 -p1 %patch125 -p1 %patch126 -p1 %patch127 -p1 %patch128 -p1 %patch129 -p1 %patch130 -p1 %patch131 -p1 %patch132 -p1 %patch133 -p1 %patch134 -p1 %patch135 -p1 %patch136 -p1 %patch137 -p1 %patch138 -p1 %patch139 -p1 %patch140 -p1 %patch141 -p1 %patch142 -p1 %patch143 -p1 %patch144 -p1 %patch145 -p1 %patch146 -p1 %patch147 -p1 %patch148 -p1 %patch149 -p1 %patch150 -p1 %patch151 -p1 %patch152 -p1 %patch153 -p1 %patch154 -p1 %patch155 -p1 %patch156 -p1 %patch157 -p1 %patch158 -p1 %patch159 -p1 %patch160 -p1 %patch161 -p1 %patch162 -p1 %patch163 -p1 %build ./autogen.sh CFLAGS="%{optflags} -fPIE" %if %{debug_build} CFLAGS="$CFLAGS -O0" %endif %configure --disable-static %if %{asan_build} find -name Makefile | xargs sed -i 's/\(^CFLAGS.*\)/\1 -fsanitize=address/' %endif make %{?_smp_mflags} LDFLAGS="-pie" %install mkdir -p %{buildroot}/{%{_mandir}/{man1,man3},usr/{bin,lib,include}} make DESTDIR=%{buildroot} install %{?_smp_mflags} for f in `find %{buildroot}/%{_mandir} -type f -print ` ; do if [ `wc -l <$f` -eq 1 ] && grep -q "^\.so " $f ; then linkto=`sed -e "s|^\.so ||" $f` [ -f "`dirname $f`/$linkto" ] && ln -sf "$linkto" $f fi done cp %{SOURCE2} . rm -rf %{buildroot}%{_datadir}/doc/tiff* find %{buildroot} -type f -name "*.la" -delete -print find html -name "Makefile*" | xargs rm %check %if %{asan_build} # ASAN needs /proc to be mounted exit 0 %endif for i in tools test; do (cd $i && make %{?_smp_mflags} check) done %post -n libtiff5 -p /sbin/ldconfig %postun -n libtiff5 -p /sbin/ldconfig %files %defattr(-,root,root) %{_bindir}/* %doc html %doc README COPYRIGHT VERSION ChangeLog TODO RELEASE-DATE %{_mandir}/man1/* %files -n libtiff5 %defattr(-,root,root) %doc README COPYRIGHT README.SUSE %{_libdir}/*.so.* %files -n libtiff-devel %defattr(-,root,root) %{_includedir}/* %{_libdir}/*.so %{_libdir}/pkgconfig/*.pc %{_mandir}/man3/* %changelog
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor