Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Backports:SLE-12-SP1
htmldoc
htmldoc.spec
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File htmldoc.spec of Package htmldoc
# # spec file for package htmldoc # # Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # Name: htmldoc BuildRequires: autoconf BuildRequires: fltk-devel BuildRequires: freeglut-devel BuildRequires: gcc-c++ BuildRequires: libdrm-devel BuildRequires: libjpeg-devel BuildRequires: libpng-devel BuildRequires: openssl-devel Url: http://htmldoc.org/ Version: 1.8.28 Release: 0 Summary: HTML Processor that Generates HTML, PostScript, and PDF Files License: GPL-2.0-or-later Group: Productivity/Publishing/HTML/Tools Source: https://github.com/michaelrsweet/htmldoc/releases/download/release-%{version}/htmldoc-%{version}-source.tar.bz2 Patch: %{name}-docpath.diff # PATCH-FIX-UPSTREAM htmldoc-cups_rand.patch upstream bug #510 Patch1: htmldoc-cups_rand.patch # PATCH-FIX-UPSTREAM 0001-Fix-crash-bug-with-bad-GIFs-Issue-423.patch -- https://github.com/michaelrsweet/htmldoc/commit/6a8322a718b2ba5c440bd33e6f26d9e281c39654 Patch2: 0001-Fix-crash-bug-with-bad-GIFs-Issue-423.patch # CVE-2021-40985 [bsc#1192357], buffer overflow may lead to DoS via a crafted BMP image Patch3: htmldoc.openSUSE_Backports_SLE-12-SP1-CVE-2021-40985.patch # CVE-2021-43579 [bsc#1194487], stack-based buffer overflow in image_load_bmp() results in remote code execution if the victim converts an HTML document linking to a crafted BMP file Patch4: htmldoc.openSUSE_Backports_SLE-12-SP1-CVE-2021-43579.patch # CVE-2022-0534 [bsc#1195758], stack out-of-bounds read in gif_get_code() when opening a malicious GIF file results in a segmentation fault Patch5: htmldoc.openSUSE_Backports_SLE-12-SP1-CVE-2022-0534.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build %define DOCDIR %{_datadir}/doc/packages/%{name} %description HTMLDOC converts HTML source files into indexed HTML, PostScript, or Portable Document Format (PDF) files that can be viewed online or printed. %prep %setup -q %patch %patch1 -p1 %patch2 -p1 %patch3 -p1 %patch4 -p1 %patch5 -p1 %build export CFLAGS="${RPM_OPT_FLAGS} -fno-strict-aliasing" autoconf ./configure \ --bindir=%{_bindir} \ --prefix=%{_usr} \ --mandir=%{_mandir} \ --with-gui make %install [ x"${RPM_BUILD_ROOT}" = x"/" ] && ( echo "your buildroot is /" && exit 0) || rm -rf "${RPM_BUILD_ROOT}" make \ bindir=${RPM_BUILD_ROOT}/%{_bindir} \ prefix=${RPM_BUILD_ROOT}/%{_usr} \ mandir=${RPM_BUILD_ROOT}/%{_mandir} \ datadir=${RPM_BUILD_ROOT}/%{_datadir} \ install %files %defattr(-,root,root) %{_bindir}/htmldoc %{_datadir}/htmldoc %doc %{_mandir}/man1/htmldoc.1.gz %doc cgi-bin/ CHANGES.txt COPYING.txt README.txt %changelog
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor