Revert "tiff: disable by default as it is full of CVE with apparently no chance to...
authorCarsten Haitzler (Rasterman) <raster@rasterman.com>
Sun, 1 May 2016 22:52:48 +0000 (07:52 +0900)
committerCarsten Haitzler (Rasterman) <raster@rasterman.com>
Sun, 1 May 2016 23:02:09 +0000 (08:02 +0900)
This reverts commit b8860c88f52c7ea3576f88f9399b777646975bd5.

i wouldn't call this full of CVE's:

http://www.cvedetails.com/product/3881/Libtiff-Libtiff.html?vendor_id=2224

i do notice various CVE's on libtiff's mailing list have had patches
committed. the CVE db doesn't track if the CVE has been fixed by
upstream (in an easy to find way) and in which version or on what date so
the CVE db simply is all CVE's since the dawn of time that were ever filed.

configure.ac

index deafdd8..2d38a43 100644 (file)
@@ -2008,7 +2008,7 @@ ARG_ENABLE_EVAS_IMAGE_LOADER(PMAPS, static)
 ARG_ENABLE_EVAS_IMAGE_LOADER(PNG, static)
 ARG_ENABLE_EVAS_IMAGE_LOADER(PSD, static)
 ARG_ENABLE_EVAS_IMAGE_LOADER(Tga, static)
-ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, no)
+ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, yes)
 ARG_ENABLE_EVAS_IMAGE_LOADER(WBMP, static)
 ARG_ENABLE_EVAS_IMAGE_LOADER(WEBP, no)
 ARG_ENABLE_EVAS_IMAGE_LOADER(XPM, static)