File tiff.spec of Package tiff.34105
#
# spec file for package tiff
#
# Copyright (c) 2024 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
%define asan_build 0
%define debug_build 0
Name: tiff
Version: 4.0.9
Release: 0
Summary: Tools for Converting from and to the Tagged Image File Format
License: HPND
Group: Productivity/Graphics/Convertors
URL: http://www.simplesystems.org/libtiff/
Source: http://download.osgeo.org/libtiff/tiff-%{version}.tar.gz
Source2: README.SUSE
Source3: baselibs.conf
Patch0: tiff-4.0.3-seek.patch
# http://bugzilla.maptools.org/show_bug.cgi?id=2442
Patch1: tiff-4.0.3-compress-warning.patch
# Bring back the bmp2tiff tool
Patch100: bmp2tiff-comeback.patch
# Bring back the gif2tiff tool
Patch101: gif2tiff-comeback.patch
# Bring back the thumbnail and rgb2ycbcr tools
Patch102: thumbnail_and_rgb2ycbcr-comeback.patch
# Bring back the ras2tiff tool
Patch103: ras2tiff-comeback.patch
Patch104: tiff-CVE-2017-9935,17973,CVE-2018-17795.patch
Patch105: tiff-4.0.9-bsc1081690-CVE-2018-5784.patch
Patch106: tiff-CVE-2018-10963.patch
Patch107: tiff-CVE-2017-18013.patch
Patch108: tiff-CVE-2018-7456.patch
Patch109: tiff-CVE-2017-11613,CVE-2018-16335,15209.patch
Patch110: tiff-CVE-2018-8905.patch
Patch111: tiff-CVE-2018-10779.patch
Patch112: tiff-CVE-2017-17942,CVE-2016-5319.patch
Patch113: tiff-CVE-2018-17100.patch
Patch114: tiff-CVE-2018-17101.patch
Patch115: tiff-CVE-2018-18661.patch
Patch116: tiff-CVE-2018-18557.patch
Patch117: tiff-CVE-2018-12900.patch
Patch118: tiff-CVE-2018-17000,19210.patch
Patch119: tiff-CVE-2019-6128.patch
Patch120: tiff-CVE-2019-7663.patch
Patch121: tiff-CVE-2016-5102.patch
Patch122: tiff-CVE-2019-14973.patch
Patch123: tiff-CVE-2020-35523.patch
Patch124: tiff-CVE-2020-35524.patch
Patch125: tiff-CVE-2020-19131.patch
Patch126: tiff-CVE-2020-35521,CVE-2020-35522.patch
Patch127: tiff-CVE-2022-22844.patch
Patch128: tiff-CVE-2017-17095.patch
Patch129: tiff-CVE-2019-17546.patch
Patch130: tiff-CVE-2022-1056,CVE-2022-0891.patch
Patch131: tiff-CVE-2022-0561,CVE-2022-34266.patch
Patch132: tiff-CVE-2022-0562.patch
Patch133: tiff-CVE-2022-0865.patch
Patch134: tiff-CVE-2022-0909.patch
Patch135: tiff-CVE-2022-0924.patch
Patch136: tiff-CVE-2022-0908.patch
Patch137: tiff-CVE-2022-2056,CVE-2022-2057,CVE-2022-2058.patch
Patch138: tiff-CVE-2022-34526.patch
Patch139: tiff-CVE-2022-2519,CVE-2022-2520,CVE-2022-2521.patch
Patch140: tiff-CVE-2022-2867,CVE-2022-2868,CVE-2022-2869.patch
Patch141: tiff-CVE-2022-3597,CVE-2022-3626,CVE-2022-3627.patch
Patch142: tiff-CVE-2022-3599.patch
Patch143: tiff-CVE-2022-3970.patch
Patch144: tiff-CVE-2022-3598,3570.patch
Patch145: tiff-CVE-2022-48281.patch
Patch146: tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
Patch147: tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch
Patch148: tiff-CVE-2023-38289.patch
Patch149: tiff-CVE-2023-38288,CVE-2023-40745,CVE-2023-41175.patch
Patch150: tiff-CVE-2023-3576.patch
Patch151: tiff-CVE-2020-18768.patch
Patch152: tiff-CVE-2023-26966.patch
Patch153: tiff-CVE-2023-3618.patch
Patch154: tiff-CVE-2023-2908.patch
Patch155: tiff-CVE-2023-3316.patch
Patch156: tiff-CVE-2023-2731.patch
Patch157: tiff-CVE-2023-26965.patch
Patch158: tiff-CVE-2022-40090.patch
Patch159: tiff-CVE-2023-1916.patch
Patch160: tiff-CVE-2023-52356.patch
Patch161: tiff-CVE-2015-8668.patch
Patch162: tiff-CVE-2023-3164.patch
BuildRequires: autoconf
BuildRequires: automake
BuildRequires: gcc-c++
BuildRequires: libjpeg-devel
BuildRequires: libtool
BuildRequires: zlib-devel
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%if 0%{?suse_version} > 1030
BuildRequires: lzma-devel
%endif
%if 0%{?suse_version} <= 1000
BuildRequires: pkgconfig
%endif
%if 0%{?suse_version} > 1000
BuildRequires: pkg-config
%endif
# bug437293
%ifarch ppc64
Obsoletes: tiff-64bit
%endif
%if 0%{?suse_version} > 1210
BuildRequires: libjbig-devel
%endif
%description
This package contains the library and support programs for the TIFF
image format.
%package -n libtiff5
Summary: The Tiff Library (with JPEG and compression support)
Group: System/Libraries
Provides: libtiff = %{version}
# bug437293
%ifarch ppc64
Obsoletes: libtiff-64bit
%endif
#
%description -n libtiff5
This package includes the tiff libraries. To link a program with
libtiff, you will have to add -ljpeg and -lz to include the necessary
libjpeg and libz in the linking process.
%package -n libtiff-devel
Summary: Development Tools for Programs which will use the libtiff Library
Group: Development/Libraries/C and C++
Requires: glibc-devel
Requires: libstdc++-devel
Requires: libtiff5 = %{version}
# bug437293
%ifarch ppc64
Obsoletes: tiff-devel-64bit
%endif
#
%description -n libtiff-devel
This package contains the header files and static libraries for
developing programs which will manipulate TIFF format image files using
the libtiff library.
%prep
%setup -q
%patch0 -p1
%patch1 -p1
%patch100 -p1
%patch101 -p1
%patch102 -p1
%patch103 -p1
%patch104 -p1
%patch105 -p1
%patch106 -p1
%patch107 -p1
%patch108 -p1
%patch109 -p1
%patch110 -p1
%patch111 -p1
%patch112 -p1
%patch113 -p1
%patch114 -p1
%patch115 -p1
%patch116 -p1
%patch117 -p1
%patch118 -p1
%patch119 -p1
%patch120 -p1
%patch121 -p1
%patch122 -p1
%patch123 -p1
%patch124 -p1
%patch125 -p1
%patch126 -p1
%patch127 -p1
%patch128 -p1
%patch129 -p1
%patch130 -p1
%patch131 -p1
%patch132 -p1
%patch133 -p1
%patch134 -p1
%patch135 -p1
%patch136 -p1
%patch137 -p1
%patch138 -p1
%patch139 -p1
%patch140 -p1
%patch141 -p1
%patch142 -p1
%patch143 -p1
%patch144 -p1
%patch145 -p1
%patch146 -p1
%patch147 -p1
%patch148 -p1
%patch149 -p1
%patch150 -p1
%patch151 -p1
%patch152 -p1
%patch153 -p1
%patch154 -p1
%patch155 -p1
%patch156 -p1
%patch157 -p1
%patch158 -p1
%patch159 -p1
%patch160 -p1
%patch161 -p1
%patch162 -p1
%build
./autogen.sh
CFLAGS="%{optflags} -fPIE"
%if %{debug_build}
CFLAGS="$CFLAGS -O0"
%endif
%configure --disable-static
%if %{asan_build}
find -name Makefile | xargs sed -i 's/\(^CFLAGS.*\)/\1 -fsanitize=address/'
%endif
make %{?_smp_mflags} LDFLAGS="-pie"
%install
mkdir -p %{buildroot}/{%{_mandir}/{man1,man3},usr/{bin,lib,include}}
make DESTDIR=%{buildroot} install %{?_smp_mflags}
for f in `find %{buildroot}/%{_mandir} -type f -print ` ; do
if [ `wc -l <$f` -eq 1 ] && grep -q "^\.so " $f ; then
linkto=`sed -e "s|^\.so ||" $f`
[ -f "`dirname $f`/$linkto" ] && ln -sf "$linkto" $f
fi
done
cp %{SOURCE2} .
rm -rf %{buildroot}%{_datadir}/doc/tiff*
find %{buildroot} -type f -name "*.la" -delete -print
find html -name "Makefile*" | xargs rm
%check
%if %{asan_build}
# ASAN needs /proc to be mounted
exit 0
%endif
for i in tools test; do
(cd $i && make %{?_smp_mflags} check)
done
%post -n libtiff5 -p /sbin/ldconfig
%postun -n libtiff5 -p /sbin/ldconfig
%files
%defattr(-,root,root)
%{_bindir}/*
%doc html
%doc README COPYRIGHT VERSION ChangeLog TODO RELEASE-DATE
%{_mandir}/man1/*
%files -n libtiff5
%defattr(-,root,root)
%doc README COPYRIGHT README.SUSE
%{_libdir}/*.so.*
%files -n libtiff-devel
%defattr(-,root,root)
%{_includedir}/*
%{_libdir}/*.so
%{_libdir}/pkgconfig/*.pc
%{_mandir}/man3/*
%changelog