17 |
Summary: The GNU Image Manipulation Program |
Summary: The GNU Image Manipulation Program |
18 |
Name: gimp |
Name: gimp |
19 |
Epoch: 1 |
Epoch: 1 |
20 |
Version: 2.8.0 |
Version: 2.8.2 |
21 |
Release: %mkrel 3 |
Release: %mkrel 1 |
22 |
License: GPLv2+ |
License: GPLv2+ |
23 |
Group: Graphics |
Group: Graphics |
24 |
URL: http://www.gimp.org/ |
URL: http://www.gimp.org/ |
29 |
Patch0: gimp-2.8.0-link.patch |
Patch0: gimp-2.8.0-link.patch |
30 |
#gw fix name in desktop file and disable startup notification |
#gw fix name in desktop file and disable startup notification |
31 |
Patch2: gimp-2.5.1-desktopentry.patch |
Patch2: gimp-2.5.1-desktopentry.patch |
|
|
|
|
# from RedHat, fix CVE-2012-3403 (rhbz#839020) |
|
|
Patch3: 0001-file-cel-check-fread-g_fopen-return-values-and-pass-.patch |
|
|
Patch4: 0002-file-cel-validate-header-data-CVE-2012-3403.patch |
|
|
Patch5: 0003-file-cel-use-statically-allocated-palette-buffer.patch |
|
|
Patch6: 0004-file-cel-use-g_set_error-for-errors-instead-of-g_mes.patch |
|
|
|
|
|
# from RedHat, fix CVE-2012-3481 (rhbz#847303) |
|
|
Patch7: 0001-file-gif-load-limit-len-and-height-CVE-2012-3481.patch |
|
|
Patch8: 0002-file-gif-load-fix-type-overflow-CVE-2012-3481.patch |
|
|
|
|
32 |
BuildRequires: pkgconfig(atk) >= 2.2.0 |
BuildRequires: pkgconfig(atk) >= 2.2.0 |
33 |
BuildRequires: pkgconfig(babl) >= 0.1.10 |
BuildRequires: pkgconfig(babl) >= 0.1.10 |
34 |
BuildRequires: pkgconfig(cairo) >= 1.10.2 |
BuildRequires: pkgconfig(cairo) >= 1.10.2 |
156 |
%setup -q -n gimp-%version |
%setup -q -n gimp-%version |
157 |
%patch0 -p0 -b .link |
%patch0 -p0 -b .link |
158 |
%patch2 -p1 -b .desktopentry |
%patch2 -p1 -b .desktopentry |
|
%patch3 -p1 |
|
|
%patch4 -p1 |
|
|
%patch5 -p1 |
|
|
%patch6 -p1 |
|
|
%patch7 -p1 |
|
|
%patch8 -p1 |
|
159 |
|
|
160 |
%build |
%build |
161 |
%configure2_5x --enable-default-binary=yes --disable-static \ |
%configure2_5x --enable-default-binary=yes --disable-static \ |