Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package tiff for openSUSE:Factory checked in at 2023-06-22 23:24:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/tiff (Old) and /work/SRC/openSUSE:Factory/.tiff.new.15902 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "tiff" Thu Jun 22 23:24:58 2023 rev:91 rq:1094296 version:4.5.1 Changes: -------- --- /work/SRC/openSUSE:Factory/tiff/tiff.changes 2023-02-23 16:40:29.488536681 +0100 +++ /work/SRC/openSUSE:Factory/.tiff.new.15902/tiff.changes 2023-06-22 23:25:05.929643740 +0200 @@ -1,0 +2,35 @@ +Tue Jun 20 07:16:56 UTC 2023 - Martin Pluskal <[email protected]> + +- Update to version 4.5.1: + * Definition of tags reformatted (clang-format off) for better readability of tag comments in tiff.h and tif_dirinfo.c + * Do not install libtiff-4.pc when tiff-install is reset. + * Add versioninfo resource files for DLL and tools compiled with Windows MSVC and MINGW. + * Disable clang-formatting for tif_config.h.cmake.in and tiffconf.h.cmake.in because sensitive for CMake scripts. + * CMake: make WebP component name compatible with upstream ConfigWebP.cmake + * CMake: make Findliblzma with upstream CMake config file + * CMake: FindDeflate.cmake: fix several errors (issue #526). + * CMake: FindLERC.cmake: version string return added. + * CMake: export TiffConfig.cmake and TiffConfigVersion.cmake files + * CMake: fix export of INTERFACE_INCLUDE_DIRECTORIES + * Hardcode HOST_FILLORDER to FILLORDER_LSB2MSB and make 'H' flag of TIFFOpen() to warn and an alias of FILLORDER_MSB2LSB. tif_lerc.c: use WORDS_BIGENDIAN instead of HOST_BIGENDIAN. + * Optimize relative seeking within TIFFSetDirectory() by using the learned list of IFD offsets. + * Improve internal IFD offset and directory number map handling. + * Behavior of TIFFOpen() mode "r+" in the Windows implementation adjusted to that of Linux. + * TIFFDirectory td_fieldsset type changed from unsigned long, which can be 32 or 64 bits, to uint32_t (fixes issue #484). + * tif_ojpeg.c: checking for division by zero (fixes issue #554). + * LZWDecode(): avoid crash when trying to read again from a strip whith a missing end-of-information marker (fixes issue #548). + * Fixed runtime error: applying zero offset to null pointer in countInkNamesString(). + * Fixing crash in TIFFUnlinkDirectory() when called with directory number zero ("TIFFUnlinkDirectory(0)") as well as fixing incorrect behaviour when unlinking the first directory. + * tif_luv: check and correct for NaN data in uv_encode() (issue #530). + * TIFFClose() avoid NULL pointer dereferencing (issue #515). + * tif_hash_set.c: include tif_hash_set.h after tif_config.h to let a chance for GDAL symbol renaming trick. + * Fax3: fix failure to decode some fax3 number_of_images and add test for Fax3 decoding issues (issue #513). + * TIFFSetDirectory() and TIFFWriteDirectorySec() avoid harmless unsigned-integer-overflow (due to gdal oss-fuzz #54311 and #54343). + * tif_ojpeg.c: fix issue #554 by checking for division by zero in OJPEGWriteHeaderInfo(). + * LZWDecode(): avoid crash when trying to read again from a strip whith a missing end-of-information marker (issue #548). +- Drop no longer needed patches: + * tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch + * tiff-CVE-2022-48281.patch + * tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch + +------------------------------------------------------------------- Old: ---- tiff-4.5.0.tar.xz tiff-4.5.0.tar.xz.sig tiff-CVE-2022-48281.patch tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch New: ---- tiff-4.5.1.tar.xz tiff-4.5.1.tar.xz.sig ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ tiff.spec ++++++ --- /var/tmp/diff_new_pack.eZPaNt/_old 2023-06-22 23:25:06.745641668 +0200 +++ /var/tmp/diff_new_pack.eZPaNt/_new 2023-06-22 23:25:06.749641658 +0200 @@ -19,7 +19,7 @@ %define asan_build 0 %define debug_build 0 Name: tiff -Version: 4.5.0 +Version: 4.5.1 Release: 0 Summary: Tools for Converting from and to the Tagged Image File Format License: HPND @@ -33,12 +33,6 @@ Patch0: tiff-4.0.3-seek.patch # http://bugzilla.maptools.org/show_bug.cgi?id=2442 Patch1: tiff-4.0.3-compress-warning.patch -# PATCH-FIX-UPSTREAM [email protected] tiff-CVE-2022-48281.patch -- bsc#1207413 -Patch2: tiff-CVE-2022-48281.patch -# PATCH-FIX-UPSTREAM [email protected] -- bsc#1208226 bsc#1208227 bsc#1208228 bsc#1208229 bsc#1208230 -Patch3: tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch -# PATCH-FIX-UPSTREAM [email protected] -- bsc#1208231 bsc#1208232 bsc#1208233 bsc#1208234 bsc#1208236 -Patch4: tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch BuildRequires: gcc-c++ BuildRequires: libjbig-devel BuildRequires: libjpeg-devel @@ -116,8 +110,7 @@ (cd $i && make %{?_smp_mflags} check) done -%post -n libtiff6 -p /sbin/ldconfig -%postun -n libtiff6 -p /sbin/ldconfig +%ldconfig_scriptlets -n libtiff6 %files %{_bindir}/* ++++++ tiff-4.5.0.tar.xz -> tiff-4.5.1.tar.xz ++++++ ++++ 52939 lines of diff (skipped)
