Commit Graph

214 Commits

Author SHA256 Message Date
Ana Guerrero
60a4d67911 Accepting request 1237432 from graphics
OBS-URL: https://build.opensuse.org/request/show/1237432
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=99
2025-01-14 15:21:47 +00:00
Michael Vetter
c2b5001a70 - Fix versioning of tiff-docs under Recommends
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=188
2025-01-13 14:40:08 +00:00
Ana Guerrero
034719d44f Accepting request 1223727 from graphics
OBS-URL: https://build.opensuse.org/request/show/1223727
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=98
2024-11-15 14:38:25 +00:00
Fridrich Strba
04ca4751dd - make doc packages noarch. no need to have those per arch
- ensure that the src rpms are named per build flavor:
  You might now ask why. Good question:
  1. the spec file during the build get patched. `@BUILD_FLAVOR@`
     gets replaced with the value. which means the src rpm between
     build flavor builds is not identical. Also the last built
     src.rpm will be published. with different content and runtime
     requires (aka our BuildRequires).
  2. for historical reasons the internal dependency tracking goes
     via the src.rpm package. So without having differently named
     src.rpms the build cycle we were trying to solve was not
     actually solved. So we append a suffix to the Name attribute
     in the preamble now.

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=186
2024-11-12 14:49:33 +00:00
Fridrich Strba
7326ed6634 - In the previous change to enable the cmake based build
we also needed python3-Sphinx to build the man pages, as unlike
  the autotools based build, the cmake based build does not fall
  back to the pre-built man pages.
  This causes build cycle. Split out the documentation building to
  break the cycle. The Tumbleweed release managers preferred this
  solution over a mini package.

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=185
2024-11-11 17:38:12 +00:00
Fridrich Strba
cb00531136 Needed for new OpenImageIO
- switch build to cmake for the webp build - we need the cmake
  finder code

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=184
2024-11-11 12:36:54 +00:00
Ana Guerrero
ad0e3f2bd3 Accepting request 1201738 from graphics
- Update to 4.7.0:
  * This version restores in the default build the availability of
    the tools that had been dropped in v4.6.0
    See https://libtiff.gitlab.io/libtiff/rfcs/rfc2_restoring_needed_tools.html#rfc2-restoring-needed-tools
  * Software configuration changes:
    + autoconf build: configure.ac: avoid -Werror passed to CFLAGS to interfere with feature detection
    + autoconf build: fix error when running make clean (fixes issue #630)
    + autoconf build: back off the minimum required automake version to 1.11
    + autoconf.ac: fix detection of windows.h for mingw (fixes issue #605)
    + libtiff-4.pc: Fix Requires.private missing Lerc. It provides a .pc file
      starting from version 4 (in autoconf builds, we assume that liblerc is at least version 4)
    + CMake: Fix TIFF_INCLUDE_DIRS
    + CMake: MinGW compilers don't need a .def file for shared library
    + CMake: move libdeflate and Lerc to Requires.private
    + CMake: enable resource compilation on all Windows.
  * Library changes:
    + Add TIFFOpenOptionsSetMaxCumulatedMemAlloc(). This function complements
      TIFFOpenOptionsSetMaxSingleMemAlloc() to define the maximum cumulated memory
      allocations in byte, for a given TIFF handle, that libtiff internal memory
      allocation functions are allowed. 
    + TIFFWriteDirectory(): Avoid overwriting following data if an IFD is enlarged.
    + TIFFXYZToRGB: avoid integer overflow (fixes issue #644)
    + uv_decode() and uv_encode(): avoid potential out-of-bounds array index (fixes issue #645)
    + Fix cases where tif_curdir is set incorrectly. Fix cases where the current directory number (tif_curdir)
      is set inconsistently or incorrectly, depending on the previous history.
    + TIFFRead[Scanline/EncodedStrip/EncodeTile]: 0-initialize output buffer if setupdecode fails ;
      most codecs: zero-initialize (not-yet-written parts of) output buffer if failure (fixes issue #375)
    + OJPEG: reset subsampling_convert_state=0 in OJPEGPreDecode (fixes issue #183)
    + ThunderRLE: fix failure when decoding last run. Bug seen with GhostPDL
    + LERC codec: deal with issues with multi-band PlanarConfig=Contig and NaN values

OBS-URL: https://build.opensuse.org/request/show/1201738
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=97
2024-09-19 19:16:44 +00:00
Michael Vetter
9eeea42aaf - Update to 4.7.0:
* This version restores in the default build the availability of
    the tools that had been dropped in v4.6.0
    See https://libtiff.gitlab.io/libtiff/rfcs/rfc2_restoring_needed_tools.html#rfc2-restoring-needed-tools
  * Software configuration changes:
    + autoconf build: configure.ac: avoid -Werror passed to CFLAGS to interfere with feature detection
    + autoconf build: fix error when running make clean (fixes issue #630)
    + autoconf build: back off the minimum required automake version to 1.11
    + autoconf.ac: fix detection of windows.h for mingw (fixes issue #605)
    + libtiff-4.pc: Fix Requires.private missing Lerc. It provides a .pc file
      starting from version 4 (in autoconf builds, we assume that liblerc is at least version 4)
    + CMake: Fix TIFF_INCLUDE_DIRS
    + CMake: MinGW compilers don't need a .def file for shared library
    + CMake: move libdeflate and Lerc to Requires.private
    + CMake: enable resource compilation on all Windows.
  * Library changes:
    + Add TIFFOpenOptionsSetMaxCumulatedMemAlloc(). This function complements
      TIFFOpenOptionsSetMaxSingleMemAlloc() to define the maximum cumulated memory
      allocations in byte, for a given TIFF handle, that libtiff internal memory
      allocation functions are allowed. 
    + TIFFWriteDirectory(): Avoid overwriting following data if an IFD is enlarged.
    + TIFFXYZToRGB: avoid integer overflow (fixes issue #644)
    + uv_decode() and uv_encode(): avoid potential out-of-bounds array index (fixes issue #645)
    + Fix cases where tif_curdir is set incorrectly. Fix cases where the current directory number (tif_curdir)
      is set inconsistently or incorrectly, depending on the previous history.
    + TIFFRead[Scanline/EncodedStrip/EncodeTile]: 0-initialize output buffer if setupdecode fails ;
      most codecs: zero-initialize (not-yet-written parts of) output buffer if failure (fixes issue #375)
    + OJPEG: reset subsampling_convert_state=0 in OJPEGPreDecode (fixes issue #183)
    + ThunderRLE: fix failure when decoding last run. Bug seen with GhostPDL
    + LERC codec: deal with issues with multi-band PlanarConfig=Contig and NaN values

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=182
2024-09-18 08:35:07 +00:00
Ana Guerrero
933d4b5ecf Accepting request 1194640 from graphics
- security update:
  * CVE-2024-7006 [bsc#1228924]
    Fix pointer deref in tif_dirinfo.c
    + tiff-CVE-2024-7006.patch

OBS-URL: https://build.opensuse.org/request/show/1194640
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=96
2024-08-20 14:12:38 +00:00
Michael Vetter
950fbd84f4 - security update:
* CVE-2024-7006 [bsc#1228924]
    Fix pointer deref in tif_dirinfo.c
    + tiff-CVE-2024-7006.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=180
2024-08-19 06:31:33 +00:00
Ana Guerrero
c89d273387 Accepting request 1141711 from graphics
- security update:
  * CVE-2023-52356 [bsc#1219213]
    Fix segfault in TIFFReadRGBATileExt()
    + tiff-CVE-2023-52356.patch

OBS-URL: https://build.opensuse.org/request/show/1141711
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=95
2024-01-26 21:46:18 +00:00
Michael Vetter
3d2e462e6b - security update:
* CVE-2023-52356 [bsc#1219213]
    Fix segfault in TIFFReadRGBATileExt()
    + tiff-CVE-2023-52356.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=178
2024-01-26 10:24:28 +00:00
Ana Guerrero
32307a48a9 Accepting request 1131379 from graphics
- CVE-2023-25435 [bsc#1212607] tiffcrop is removed

OBS-URL: https://build.opensuse.org/request/show/1131379
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=94
2023-12-06 22:48:31 +00:00
Michael Vetter
3a70048a50 - CVE-2023-25435 [bsc#1212607] tiffcrop is removed
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=176
2023-12-06 14:41:42 +00:00
Ana Guerrero
171b2f5ebe Accepting request 1121286 from graphics
[bsc#1205422]
  * CVE-2022-22844 bsc#1194539
  * CVE-2022-2867 bsc#1202466
  * CVE-2022-2868 bsc#1202467
  * CVE-2022-2869 bsc#1202468
  * CVE-2022-34266 [bsc#1201723] [bsc#1201971]
  * CVE-2020-35521 bsc#1182808
  * CVE-2020-35522 bsc#1182809
  * CVE-2020-35523 bsc#1182811
  * CVE-2020-35524 bsc#1182812
  * CVE-2019-17546 bsc#1154365
  * CVE-2017-17095 bsc#1071031
  * CVE-2019-14973 bsc#1146608
  * CVE-2020-19131 bsc#1190312
  * fixes several CVEs mentioned below plus CVE-2018-18557 [bsc#1113094]
  and CVE-2018-18661 [bsc#1113672] and more
      (CVE-2017-12944, bsc#1054594)
  * CVE-2016-10092, CVE-2016-10093, CVE-2016-10094 [bsc#1017693]
      (bsc#990460, CVE-2016-6223)

OBS-URL: https://build.opensuse.org/request/show/1121286
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=93
2023-10-30 21:10:47 +00:00
Michael Vetter
6470c6d9db [bsc#1205422]
* CVE-2022-22844 bsc#1194539
  * CVE-2022-2867 bsc#1202466
  * CVE-2022-2868 bsc#1202467
  * CVE-2022-2869 bsc#1202468
  * CVE-2022-34266 [bsc#1201723] [bsc#1201971]
  * CVE-2020-35521 bsc#1182808
  * CVE-2020-35522 bsc#1182809
  * CVE-2020-35523 bsc#1182811
  * CVE-2020-35524 bsc#1182812
  * CVE-2019-17546 bsc#1154365
  * CVE-2017-17095 bsc#1071031
  * CVE-2019-14973 bsc#1146608
  * CVE-2020-19131 bsc#1190312
  * fixes several CVEs mentioned below plus CVE-2018-18557 [bsc#1113094]
  and CVE-2018-18661 [bsc#1113672] and more
      (CVE-2017-12944, bsc#1054594)
  * CVE-2016-10092, CVE-2016-10093, CVE-2016-10094 [bsc#1017693]
      (bsc#990460, CVE-2016-6223)

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=174
2023-10-30 18:31:49 +00:00
Ana Guerrero
432a8ed212 Accepting request 1111461 from graphics
OBS-URL: https://build.opensuse.org/request/show/1111461
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=92
2023-09-17 17:28:50 +00:00
Michael Vetter
7068726bc8 Accepting request 1111454 from home:polslinux:branches:graphics
- Update to version 4.6.0:
  * API/ABI breaks: none
  * WebP decoder: validate WebP blob width, height, band count against
    TIFF parameters to avoid use of uninitialized variable, or decoding
    corrupted content without explicit error (fixes issue #581, issue #582).
  * WebP codec: turn exact mode when creating lossless files to avoid
    altering R,G,B values in areas where alpha=0 
  * Fix TransferFunction writing of only two transfer functions.
  * TIFFReadDirectoryCheckOrder: avoid integer overflow. When it occurs,
    it should be harmless in practice though 
  * tiffcp: remove -i option (ignore errors)
  * This version removes a big number of utilities that have suffered from
    lack of maintenance over the years and were the source of various
    reported security issues:
    + fax2ps
    + fax2tiff
    + pal2rgb
    + ppm2tiff
    + raw2tiff
    + rgb2ycbcr
    + thumbnail
    + tiff2bw
    + tiff2rgba
    + tiffcmp
    + tiffcrop
    + tiffdither
    + tiffgt
    + tiffmedian
    + tiff2ps
    + tiff2pdf

OBS-URL: https://build.opensuse.org/request/show/1111454
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=172
2023-09-15 07:08:05 +00:00
Dominique Leuenberger
7741b6198a Accepting request 1094296 from graphics
OBS-URL: https://build.opensuse.org/request/show/1094296
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=91
2023-06-22 21:24:58 +00:00
Fridrich Strba
fca2ecca59 Accepting request 1093894 from home:pluskalm:branches:graphics
- Update to version 4.5.1:
  * Definition of tags reformatted (clang-format off) for better readability of tag comments in tiff.h and tif_dirinfo.c
  * Do not install libtiff-4.pc when tiff-install is reset.
  * Add versioninfo resource files for DLL and tools compiled with Windows MSVC and MINGW.
  * Disable clang-formatting for tif_config.h.cmake.in and tiffconf.h.cmake.in because sensitive for CMake scripts.
  * CMake: make WebP component name compatible with upstream ConfigWebP.cmake
  * CMake: make Findliblzma with upstream CMake config file
  * CMake: FindDeflate.cmake: fix several errors (issue #526).
  * CMake: FindLERC.cmake: version string return added.
  * CMake: export TiffConfig.cmake and TiffConfigVersion.cmake files
  * CMake: fix export of INTERFACE_INCLUDE_DIRECTORIES
  * Hardcode HOST_FILLORDER to FILLORDER_LSB2MSB and make 'H' flag of TIFFOpen() to warn and an alias of FILLORDER_MSB2LSB. tif_lerc.c: use WORDS_BIGENDIAN instead of HOST_BIGENDIAN.
  * Optimize relative seeking within TIFFSetDirectory() by using the learned list of IFD offsets.
  * Improve internal IFD offset and directory number map handling.
  * Behavior of TIFFOpen() mode "r+" in the Windows implementation adjusted to that of Linux.
  * TIFFDirectory td_fieldsset type changed from unsigned long, which can be 32 or 64 bits, to uint32_t (fixes issue #484).
  * tif_ojpeg.c: checking for division by zero (fixes issue #554).
  * LZWDecode(): avoid crash when trying to read again from a strip whith a missing end-of-information marker (fixes issue #548).
  * Fixed runtime error: applying zero offset to null pointer in countInkNamesString().
  * Fixing crash in TIFFUnlinkDirectory() when called with directory number zero ("TIFFUnlinkDirectory(0)") as well as fixing incorrect behaviour when unlinking the first directory.
  * tif_luv: check and correct for NaN data in uv_encode() (issue #530).
  * TIFFClose() avoid NULL pointer dereferencing (issue #515).
  * tif_hash_set.c: include tif_hash_set.h after tif_config.h to let a chance for GDAL symbol renaming trick.
  * Fax3: fix failure to decode some fax3 number_of_images and add test for Fax3 decoding issues (issue #513).
  * TIFFSetDirectory() and TIFFWriteDirectorySec() avoid harmless unsigned-integer-overflow (due to gdal oss-fuzz #54311 and #54343).
  * tif_ojpeg.c: fix issue #554 by checking for division by zero in OJPEGWriteHeaderInfo().
  * LZWDecode(): avoid crash when trying to read again from a strip whith a missing end-of-information marker (issue #548).
- Drop no longer needed patches:
  * tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
  * tiff-CVE-2022-48281.patch
  * tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch

OBS-URL: https://build.opensuse.org/request/show/1093894
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=170
2023-06-21 06:34:02 +00:00
Dominique Leuenberger
477d6487ea Accepting request 1067182 from graphics
- security update:
  * CVE-2023-0795 [bsc#1208226]
  * CVE-2023-0796 [bsc#1208227]
  * CVE-2023-0797 [bsc#1208228]
  * CVE-2023-0798 [bsc#1208229]
  * CVE-2023-0799 [bsc#1208230]
    + tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
  * CVE-2023-0800 [bsc#1208231]
  * CVE-2023-0801 [bsc#1208232]
  * CVE-2023-0802 [bsc#1208233]
  * CVE-2023-0803 [bsc#1208234]
  * CVE-2023-0804 [bsc#1208236]
    + tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch

OBS-URL: https://build.opensuse.org/request/show/1067182
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=90
2023-02-23 15:28:23 +00:00
Michael Vetter
088c9a554f - security update:
* CVE-2023-0795 [bsc#1208226]
  * CVE-2023-0796 [bsc#1208227]
  * CVE-2023-0797 [bsc#1208228]
  * CVE-2023-0798 [bsc#1208229]
  * CVE-2023-0799 [bsc#1208230]
    + tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
  * CVE-2023-0800 [bsc#1208231]
  * CVE-2023-0801 [bsc#1208232]
  * CVE-2023-0802 [bsc#1208233]
  * CVE-2023-0803 [bsc#1208234]
  * CVE-2023-0804 [bsc#1208236]
    + tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=168
2023-02-22 15:11:36 +00:00
Dominique Leuenberger
a8baaf176e Accepting request 1061126 from graphics
- security update:
  * CVE-2022-48281 [bsc#1207413]
    + tiff-CVE-2022-48281.patch

OBS-URL: https://build.opensuse.org/request/show/1061126
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=89
2023-01-27 09:15:21 +00:00
Michael Vetter
8857c133f6 - security update:
* CVE-2022-48281 [bsc#1207413]
    + tiff-CVE-2022-48281.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=166
2023-01-26 07:58:54 +00:00
Dominique Leuenberger
d068ed011f Accepting request 1057209 from graphics
OBS-URL: https://build.opensuse.org/request/show/1057209
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=88
2023-01-11 13:32:56 +00:00
Michael Vetter
d5facc88d0 Accepting request 1057208 from home:polslinux:branches:graphics
- Update to 4.5.0:
  * tdir_t type updated to uint32_t. This type is now used for the return
    value of TIFFCurrentDirectory() and TIFFNumberOfDirectories(), and as
    the argument of TIFFSetDirectory() and TIFFUnlinkDirectory()
  * Addition of an open option concept with the new functions TIFFOpenExt(),
    TIFFOpenWExt(), TIFFFdOpenExt(), TIFFClientOpenExt(), TIFFOpenOptionsAlloc(),
    TIFFOpenOptionsFree()
  * Leveraging above mentioned open option concept, addition of a new capability
    to limit the size of a single dynamic memory allocation done by the library
    with TIFFOpenOptionsSetMaxSingleMemAlloc()
  * Related to IFD-Loop detection refactoring, the number of IFDs that libtiff
    can browse through has been extended from 65535 to 1048576. This value is
    a build-time setting that can be configured with CMake's TIFF_MAX_DIR_COUNT
    variable or autoconf's --with-max-dir-count option.
  * Whole code base reformatting of .c/.h files using new .clang-format format
  * Documentation changed from static HTML and man pages to
    Restructured Text (rst). HTML and man pages are now build artifacts.
  * SONAME version bumped to 6 due to changes in symbol versioning.
  * autoconf/cmake: detect (not yet released) libjpeg-turbo 2.2 to take into
    its capability of handling both 8-bit JPEG and 12-bit JPEG in a single build.
  * autoconf/cmake: detect sphinx-build to build HTML and man pages
  * CMakeLists.txt: fix warning with -Wdev
  * CMake: correctly set default value of 'lzma' option when liblzma is detected 
  * CMake: Moved linking of CMath::CMath into CMath_LIBRARY check.
  * Fix CMake build to be compatible with FetchContent.
  * cmake: Correct duplicate definition of _CRT_SECURE_NO_WARNINGS 
  * cmake: Fixes for Visual Studio 2022.
  * Adds Requires.private generation so that pkg-config can correctly find
    the dependencies of libtiff.
  * Fix dependency on libm on Android

OBS-URL: https://build.opensuse.org/request/show/1057208
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=164
2023-01-10 07:35:38 +00:00
Dominique Leuenberger
7bb139ce5c Accepting request 1035628 from graphics
- security update:
  * CVE-2022-3970 [bsc#1205392]
    + tiff-CVE-2022-3970.patch

- security update:
  * CVE-2022-3597 [bsc#1204641]
  * CVE-2022-3626 [bsc#1204644]
  * CVE-2022-3627 [bsc#1204645]
    + tiff-CVE-2022-3597,CVE-2022-3626,CVE-2022-3627.patch
  * CVE-2022-3599 [bsc#1204643]
    + tiff-CVE-2022-3599.patch
  * CVE-2022-3598 [bsc#1204642]
    + tiff-CVE-2022-3598.patch

OBS-URL: https://build.opensuse.org/request/show/1035628
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=87
2022-11-15 12:18:18 +00:00
Michael Vetter
9b48e2850a - security update:
* CVE-2022-3970 [bsc#1205392]
    + tiff-CVE-2022-3970.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=162
2022-11-14 11:55:22 +00:00
Michael Vetter
4de82c0597 - security update:
* CVE-2022-3597 [bsc#1204641]
  * CVE-2022-3626 [bsc#1204644]
  * CVE-2022-3627 [bsc#1204645]
    + tiff-CVE-2022-3597,CVE-2022-3626,CVE-2022-3627.patch
  * CVE-2022-3599 [bsc#1204643]
    + tiff-CVE-2022-3599.patch
  * CVE-2022-3598 [bsc#1204642]
    + tiff-CVE-2022-3598.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=161
2022-11-13 21:30:29 +00:00
Dominique Leuenberger
6d626a6089 Accepting request 1012108 from graphics
- security update:
  * CVE-2022-2519 [bsc#1202968]
  * CVE-2022-2520 [bsc#1202973]
  * CVE-2022-2521 [bsc#1202971]
    + tiff-CVE-2022-2519,CVE-2022-2520,CVE-2022-2521.patch

OBS-URL: https://build.opensuse.org/request/show/1012108
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=86
2022-10-18 10:44:32 +00:00
Michael Vetter
3c8f3f3c44 - security update:
* CVE-2022-2519 [bsc#1202968]
  * CVE-2022-2520 [bsc#1202973]
  * CVE-2022-2521 [bsc#1202971]
    + tiff-CVE-2022-2519,CVE-2022-2520,CVE-2022-2521.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=159
2022-10-17 12:57:32 +00:00
Dominique Leuenberger
4666a8ab8e Accepting request 992028 from graphics
- security update:
  * CVE-2022-34526 [bsc#1202026]
    + tiff-CVE-2022-34526.patch

OBS-URL: https://build.opensuse.org/request/show/992028
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=85
2022-08-02 20:08:37 +00:00
Michael Vetter
c20d284a28 - security update:
* CVE-2022-34526 [bsc#1202026]
    + tiff-CVE-2022-34526.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=157
2022-08-01 12:17:33 +00:00
Dominique Leuenberger
063700a359 Accepting request 987003 from graphics
- security update
  * CVE-2022-2056 [bsc#1201176]
  * CVE-2022-2057 [bsc#1201175]
  * CVE-2022-2058 [bsc#1201174]
    + tiff-CVE-2022-2056,CVE-2022-2057,CVE-2022-2058.patch

OBS-URL: https://build.opensuse.org/request/show/987003
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=84
2022-07-07 10:56:17 +00:00
Michael Vetter
2513c77eae - security update
* CVE-2022-2056 [bsc#1201176]
  * CVE-2022-2057 [bsc#1201175]
  * CVE-2022-2058 [bsc#1201174]
    + tiff-CVE-2022-2056,CVE-2022-2057,CVE-2022-2058.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=155
2022-07-06 09:39:31 +00:00
Dominique Leuenberger
5fbf50e261 Accepting request 979828 from graphics
- update to 4.4.0:
  * TIFFIsBigTiff() function added.
  * Functions TIFFFieldSetGetSize() and TIFFieldSetGetCountSize() added.
  * LZWDecode(): major speed improvements (~30% faster)
  * Predictor 2 (horizontal differenciation): support 64-bit
  * Support libjpeg 9d
  * avoid hang in TIFFRewriteDirectory() if a classic file > 4 GB is attempted
    to be created
  * tif_jbig.c: fix crash when reading a file with multiple IFD in
    memory-mapped mode and when bit reversal is needed
  * TIFFFetchNormalTag(): avoid calling memcpy() with a null source pointer and
    size of zero
  * TIFFWriteDirectoryTagData(): turn assertion on data length into a runtime
    check
  * TIFFFetchStripThing(): avoid calling memcpy() with a null source pointer
    and size of zero
  * TIFFReadDirectory(): avoid calling memcpy() with a null source pointer and
    size of zero
  * TIFFYCbCrToRGBInit(): avoid Integer-overflow
  * TIFFGetField(TIFFTAG_STRIPBYTECOUNTS/TIFFTAG_STRIPOFFSETS): return error if
    returned pointer is NULL (fixes #342)
  * OJPEG: avoid assertion when using TIFFReadScanline()
  * TIFFReadDirectory: fix OJPEG hack
  * LZW codec: fix support for strips/tiles > 2 GB on Windows
  * TIFFAppendToStrip(): fix rewrite-in-place logic
  * Fix TIFFRewriteDirectory discarding directories.
  * TIFFReadCustomDirectory(): avoid crash when reading SubjectDistance tag on
    a non EXIF directory
  * Fix Segmentation fault printing GPS directory if Altitude tag is present
  * tif_jpeg.c: do not emit progressive scans with mozjpeg. (#266)

OBS-URL: https://build.opensuse.org/request/show/979828
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=83
2022-06-03 12:15:28 +00:00
Michael Vetter
b84395b7e1 tiff-CVE-2022-0908.patch, tiff-CVE-2022-1056,CVE-2022-0891.patch: all upstream
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=153
2022-05-30 09:42:51 +00:00
Michael Vetter
f3c286f315 Accepting request 979753 from home:dirkmueller:Factory
- update to 4.4.0:
  * TIFFIsBigTiff() function added.
  * Functions TIFFFieldSetGetSize() and TIFFieldSetGetCountSize() added.
  * LZWDecode(): major speed improvements (~30% faster)
  * Predictor 2 (horizontal differenciation): support 64-bit
  * Support libjpeg 9d
  * avoid hang in TIFFRewriteDirectory() if a classic file > 4 GB is attempted
    to be created
  * tif_jbig.c: fix crash when reading a file with multiple IFD in
    memory-mapped mode and when bit reversal is needed
  * TIFFFetchNormalTag(): avoid calling memcpy() with a null source pointer and
    size of zero
  * TIFFWriteDirectoryTagData(): turn assertion on data length into a runtime
    check
  * TIFFFetchStripThing(): avoid calling memcpy() with a null source pointer
    and size of zero
  * TIFFReadDirectory(): avoid calling memcpy() with a null source pointer and
    size of zero
  * TIFFYCbCrToRGBInit(): avoid Integer-overflow
  * TIFFGetField(TIFFTAG_STRIPBYTECOUNTS/TIFFTAG_STRIPOFFSETS): return error if
    returned pointer is NULL (fixes #342)
  * OJPEG: avoid assertion when using TIFFReadScanline()
  * TIFFReadDirectory: fix OJPEG hack
  * LZW codec: fix support for strips/tiles > 2 GB on Windows
  * TIFFAppendToStrip(): fix rewrite-in-place logic
  * Fix TIFFRewriteDirectory discarding directories.
  * TIFFReadCustomDirectory(): avoid crash when reading SubjectDistance tag on
    a non EXIF directory
  * Fix Segmentation fault printing GPS directory if Altitude tag is present
  * tif_jpeg.c: do not emit progressive scans with mozjpeg. (#266)

OBS-URL: https://build.opensuse.org/request/show/979753
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=152
2022-05-30 07:12:53 +00:00
Dominique Leuenberger
ba94fea0bc Accepting request 975780 from graphics
- security update:
  * CVE-2022-0907 [bsc#1197070]
    + tiff-CVE-2022-0907.patch

- security update
  * CVE-2022-0561 [bsc#1195964]
    + tiff-CVE-2022-0561.patch
  * CVE-2022-0562 [bsc#1195965]
    + tiff-CVE-2022-0562.patch
  * CVE-2022-0865 [bsc#1197066]
    + tiff-CVE-2022-0865.patch
  * CVE-2022-0909 [bsc#1197072]
    + tiff-CVE-2022-0909.patch
  * CVE-2022-0924 [bsc#1197073]
    + tiff-CVE-2022-0924.patch
  * CVE-2022-0908 [bsc#1197074]
    + tiff-CVE-2022-0908.patch

- security update
  * CVE-2022-1056 [bsc#1197631]
  * CVE-2022-0891 [bsc#1197068]
    + tiff-CVE-2022-1056,CVE-2022-0891.patch

- switch source url to https

OBS-URL: https://build.opensuse.org/request/show/975780
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=82
2022-05-10 13:11:29 +00:00
Michael Vetter
b69ad69187 - security update:
* CVE-2022-0907 [bsc#1197070]
    + tiff-CVE-2022-0907.patch

- security update
  * CVE-2022-0561 [bsc#1195964]
    + tiff-CVE-2022-0561.patch
  * CVE-2022-0562 [bsc#1195965]
    + tiff-CVE-2022-0562.patch
  * CVE-2022-0865 [bsc#1197066]
    + tiff-CVE-2022-0865.patch
  * CVE-2022-0909 [bsc#1197072]
    + tiff-CVE-2022-0909.patch
  * CVE-2022-0924 [bsc#1197073]
    + tiff-CVE-2022-0924.patch
  * CVE-2022-0908 [bsc#1197074]
    + tiff-CVE-2022-0908.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=150
2022-05-09 10:52:41 +00:00
Michael Vetter
9870b75817 - security update
* CVE-2022-1056 [bsc#1197631]
  * CVE-2022-0891 [bsc#1197068]
    + tiff-CVE-2022-1056,CVE-2022-0891.patch

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=149
2022-05-06 09:22:02 +00:00
229cd89783 - switch source url to https
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=148
2022-05-04 08:39:52 +00:00
Dominique Leuenberger
454c78f5d0 Accepting request 888526 from graphics
OBS-URL: https://build.opensuse.org/request/show/888526
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=81
2021-04-28 23:36:36 +00:00
Michael Vetter
05c38cdd4c Accepting request 888512 from home:polslinux:branches:graphics
- version update to 4.3.0
  * Build and usage of the library and its utilities requires a C99
    capable compiler.
  * New optional codec for the LERC (Limited Error Raster Compression)
    compression scheme. To have it available, configure libtiff against
    the SDK available at https://github.com/esri/lerc
  * Removal of unused, or now useless due to C99 availability,
    functions in port/
  * tiffcmp: fix comparaison with pixels that are
    fractional number of bytes
  * tiff2ps: exit the loop in case of error
  * tiff2pdf: check that tiff_datasize fits in a signed tsize_t

OBS-URL: https://build.opensuse.org/request/show/888512
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=146
2021-04-26 15:21:43 +00:00
Dominique Leuenberger
f849ccc173 Accepting request 859053 from graphics
- version update to 4.2.0
  Major changes:
  * Optional support for using libdeflate is added.
  * Many of the tools now support a memory usage limit.
  See http://www.simplesystems.org/libtiff/v4.2.0.html for more.

OBS-URL: https://build.opensuse.org/request/show/859053
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=80
2020-12-31 08:58:25 +00:00
78a3d62afc - version update to 4.2.0
Major changes:
  * Optional support for using libdeflate is added.
  * Many of the tools now support a memory usage limit.
  See http://www.simplesystems.org/libtiff/v4.2.0.html for more.

OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=144
2020-12-28 16:05:12 +00:00
Dominique Leuenberger
7341936a9f Accepting request 790472 from graphics
- Drop webp support as it would introduce build cycle (forwarded request 790408 from pluskalm)

OBS-URL: https://build.opensuse.org/request/show/790472
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=79
2020-04-05 18:50:49 +00:00
19874cc655 Accepting request 790408 from home:pluskalm:branches:graphics
- Drop webp support as it would introduce build cycle

OBS-URL: https://build.opensuse.org/request/show/790408
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=142
2020-04-01 07:43:04 +00:00
d7a17437c0 Accepting request 789832 from home:pluskalm:branches:graphics
- Enable zstd and webp support

OBS-URL: https://build.opensuse.org/request/show/789832
OBS-URL: https://build.opensuse.org/package/show/graphics/tiff?expand=0&rev=141
2020-03-30 15:48:36 +00:00
Dominique Leuenberger
f7e28e5a90 Accepting request 745991 from graphics
OBS-URL: https://build.opensuse.org/request/show/745991
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/tiff?expand=0&rev=78
2019-11-11 11:57:59 +00:00