Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package tiff for openSUSE:Factory checked in 
at 2023-06-22 23:24:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tiff (Old)
 and      /work/SRC/openSUSE:Factory/.tiff.new.15902 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tiff"

Thu Jun 22 23:24:58 2023 rev:91 rq:1094296 version:4.5.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/tiff/tiff.changes        2023-02-23 
16:40:29.488536681 +0100
+++ /work/SRC/openSUSE:Factory/.tiff.new.15902/tiff.changes     2023-06-22 
23:25:05.929643740 +0200
@@ -1,0 +2,35 @@
+Tue Jun 20 07:16:56 UTC 2023 - Martin Pluskal <[email protected]>
+
+- Update to version 4.5.1:
+  * Definition of tags reformatted (clang-format off) for better readability 
of tag comments in tiff.h and tif_dirinfo.c
+  * Do not install libtiff-4.pc when tiff-install is reset.
+  * Add versioninfo resource files for DLL and tools compiled with Windows 
MSVC and MINGW.
+  * Disable clang-formatting for tif_config.h.cmake.in and tiffconf.h.cmake.in 
because sensitive for CMake scripts.
+  * CMake: make WebP component name compatible with upstream ConfigWebP.cmake
+  * CMake: make Findliblzma with upstream CMake config file
+  * CMake: FindDeflate.cmake: fix several errors (issue #526).
+  * CMake: FindLERC.cmake: version string return added.
+  * CMake: export TiffConfig.cmake and TiffConfigVersion.cmake files
+  * CMake: fix export of INTERFACE_INCLUDE_DIRECTORIES
+  * Hardcode HOST_FILLORDER to FILLORDER_LSB2MSB and make 'H' flag of 
TIFFOpen() to warn and an alias of FILLORDER_MSB2LSB. tif_lerc.c: use 
WORDS_BIGENDIAN instead of HOST_BIGENDIAN.
+  * Optimize relative seeking within TIFFSetDirectory() by using the learned 
list of IFD offsets.
+  * Improve internal IFD offset and directory number map handling.
+  * Behavior of TIFFOpen() mode "r+" in the Windows implementation adjusted to 
that of Linux.
+  * TIFFDirectory td_fieldsset type changed from unsigned long, which can be 
32 or 64 bits, to uint32_t (fixes issue #484).
+  * tif_ojpeg.c: checking for division by zero (fixes issue #554).
+  * LZWDecode(): avoid crash when trying to read again from a strip whith a 
missing end-of-information marker (fixes issue #548).
+  * Fixed runtime error: applying zero offset to null pointer in 
countInkNamesString().
+  * Fixing crash in TIFFUnlinkDirectory() when called with directory number 
zero ("TIFFUnlinkDirectory(0)") as well as fixing incorrect behaviour when 
unlinking the first directory.
+  * tif_luv: check and correct for NaN data in uv_encode() (issue #530).
+  * TIFFClose() avoid NULL pointer dereferencing (issue #515).
+  * tif_hash_set.c: include tif_hash_set.h after tif_config.h to let a chance 
for GDAL symbol renaming trick.
+  * Fax3: fix failure to decode some fax3 number_of_images and add test for 
Fax3 decoding issues (issue #513).
+  * TIFFSetDirectory() and TIFFWriteDirectorySec() avoid harmless 
unsigned-integer-overflow (due to gdal oss-fuzz #54311 and #54343).
+  * tif_ojpeg.c: fix issue #554 by checking for division by zero in 
OJPEGWriteHeaderInfo().
+  * LZWDecode(): avoid crash when trying to read again from a strip whith a 
missing end-of-information marker (issue #548).
+- Drop no longer needed patches:
+  * 
tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
+  * tiff-CVE-2022-48281.patch
+  * 
tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch
 
+
+-------------------------------------------------------------------

Old:
----
  tiff-4.5.0.tar.xz
  tiff-4.5.0.tar.xz.sig
  tiff-CVE-2022-48281.patch
  
tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
  
tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch

New:
----
  tiff-4.5.1.tar.xz
  tiff-4.5.1.tar.xz.sig

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tiff.spec ++++++
--- /var/tmp/diff_new_pack.eZPaNt/_old  2023-06-22 23:25:06.745641668 +0200
+++ /var/tmp/diff_new_pack.eZPaNt/_new  2023-06-22 23:25:06.749641658 +0200
@@ -19,7 +19,7 @@
 %define asan_build 0
 %define debug_build 0
 Name:           tiff
-Version:        4.5.0
+Version:        4.5.1
 Release:        0
 Summary:        Tools for Converting from and to the Tagged Image File Format
 License:        HPND
@@ -33,12 +33,6 @@
 Patch0:         tiff-4.0.3-seek.patch
 # http://bugzilla.maptools.org/show_bug.cgi?id=2442
 Patch1:         tiff-4.0.3-compress-warning.patch
-# PATCH-FIX-UPSTREAM [email protected] tiff-CVE-2022-48281.patch -- bsc#1207413
-Patch2:         tiff-CVE-2022-48281.patch
-# PATCH-FIX-UPSTREAM [email protected] -- bsc#1208226 bsc#1208227 bsc#1208228 
bsc#1208229 bsc#1208230
-Patch3:         
tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
-# PATCH-FIX-UPSTREAM [email protected] -- bsc#1208231 bsc#1208232 bsc#1208233 
bsc#1208234 bsc#1208236
-Patch4:         
tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch
 BuildRequires:  gcc-c++
 BuildRequires:  libjbig-devel
 BuildRequires:  libjpeg-devel
@@ -116,8 +110,7 @@
        (cd $i && make %{?_smp_mflags} check)
 done
 
-%post -n libtiff6 -p /sbin/ldconfig
-%postun -n libtiff6 -p /sbin/ldconfig
+%ldconfig_scriptlets -n libtiff6
 
 %files
 %{_bindir}/*

++++++ tiff-4.5.0.tar.xz -> tiff-4.5.1.tar.xz ++++++
++++ 52939 lines of diff (skipped)

Reply via email to