- updated to 3.9.5:
* fixed integer overflow CVE-2010-4665 * fixed buffer overflow in ojpeg decoder * upstreamed: - oob-read.patch - CVE-2011-0192.patch - getimage-64bit.patch - CVE-2011-1167.patch - scanlinesize.patch OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=29
This commit is contained in:
12
tiff.spec
12
tiff.spec
@@ -28,7 +28,7 @@ Obsoletes: tiff-64bit
|
||||
%endif
|
||||
#
|
||||
Url: http://www.remotesensing.org/libtiff/
|
||||
Version: 3.9.4
|
||||
Version: 3.9.5
|
||||
Release: 4
|
||||
Summary: Tools for Converting from and to the Tiff Format
|
||||
Source: tiff-%{version}.tar.bz2
|
||||
@@ -36,12 +36,7 @@ Source2: README.SUSE
|
||||
Source3: baselibs.conf
|
||||
Patch2: tiff-%{version}-seek.patch
|
||||
Patch3: tiff-%{version}-tiff2pdf-colors.patch
|
||||
Patch6: tiff-%{version}-oob-read.patch
|
||||
Patch7: tiff-%{version}-getimage-64bit.patch
|
||||
Patch8: tiff-%{version}-scanlinesize.patch
|
||||
Patch9: tiff-%{version}-dont-fancy-upsampling.patch
|
||||
Patch10: tiff-%{version}-CVE-2011-0192.patch
|
||||
Patch11: tiff-3.9.4-CVE-2011-1167.patch
|
||||
# FYI: this issue is solved another way
|
||||
# http://bugzilla.maptools.org/show_bug.cgi?id=1985#c1
|
||||
# Patch9: tiff-%{version}-lzw-CVE-2009-2285.patch
|
||||
@@ -103,12 +98,7 @@ the libtiff library.
|
||||
%setup -q
|
||||
%patch2
|
||||
%patch3 -p1
|
||||
%patch6 -p1
|
||||
%patch7 -p1
|
||||
%patch8 -p1
|
||||
%patch9 -p1
|
||||
%patch10
|
||||
%patch11
|
||||
find -type d -name "CVS" | xargs rm -rfv
|
||||
find -type d | xargs chmod 755
|
||||
|
||||
|
Reference in New Issue
Block a user