mirror of
https://git.yoctoproject.org/poky
synced 2026-03-12 18:29:42 +01:00
Upstream-Commit: ed141286a3
(From OE-Core rev: 08823f96a400055e5924bae3af0d2dfaf488148b)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
122 lines
5.4 KiB
BlitzBasic
122 lines
5.4 KiB
BlitzBasic
SUMMARY = "Provides support for the Tag Image File Format (TIFF)"
|
|
DESCRIPTION = "Library provides support for the Tag Image File Format \
|
|
(TIFF), a widely used format for storing image data. This library \
|
|
provide means to easily access and create TIFF image files."
|
|
HOMEPAGE = "http://www.libtiff.org/"
|
|
LICENSE = "libtiff"
|
|
LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=34da3db46fab7501992f9615d7e158cf"
|
|
|
|
CVE_PRODUCT = "libtiff"
|
|
|
|
SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
|
|
file://0001-tiffset-fix-global-buffer-overflow-for-ASCII-tags-wh.patch \
|
|
file://561599c99f987dc32ae110370cfdd7df7975586b.patch \
|
|
file://eecb0712f4c3a5b449f70c57988260a667ddbdef.patch \
|
|
file://0001-tif_jbig.c-fix-crash-when-reading-a-file-with-multip.patch \
|
|
file://0002-tiffcrop-fix-issue-380-and-382-heap-buffer-overflow-.patch \
|
|
file://0003-add-checks-for-return-value-of-limitMalloc-392.patch \
|
|
file://0004-TIFFFetchNormalTag-avoid-calling-memcpy-with-a-null-.patch \
|
|
file://0005-fix-the-FPE-in-tiffcrop-393.patch \
|
|
file://0006-fix-heap-buffer-overflow-in-tiffcp-278.patch \
|
|
file://0001-fix-the-FPE-in-tiffcrop-415-427-and-428.patch \
|
|
file://CVE-2022-1354.patch \
|
|
file://CVE-2022-1355.patch \
|
|
file://CVE-2022-34526.patch \
|
|
file://CVE-2022-2869.patch \
|
|
file://CVE-2022-2867.patch \
|
|
file://b258ed69a485a9cfb299d9f060eb2a46c54e5903.patch \
|
|
file://0001-tiffcrop-Fix-issue-330-and-some-more-from-320-to-349.patch \
|
|
file://CVE-2022-2953.patch \
|
|
file://CVE-2022-3970.patch \
|
|
file://0001-Revised-handling-of-TIFFTAG_INKNAMES-and-related-TIF.patch \
|
|
file://0001-tiffcrop-S-option-Make-decision-simpler.patch \
|
|
file://0001-tiffcrop-disable-incompatibility-of-Z-X-Y-z-options-.patch \
|
|
file://0001-tiffcrop-subroutines-require-a-larger-buffer-fixes-2.patch \
|
|
file://CVE-2022-48281.patch \
|
|
file://CVE-2023-0800_0801_0802_0803_0804.patch \
|
|
file://CVE-2023-0795_0796_0797_0798_0799.patch \
|
|
file://CVE-2023-25433.patch \
|
|
file://CVE-2023-25434-CVE-2023-25435.patch \
|
|
file://CVE-2023-26965.patch \
|
|
file://CVE-2023-2908.patch \
|
|
file://CVE-2023-3316.patch \
|
|
file://CVE-2023-3576.patch \
|
|
file://CVE-2023-3618.patch \
|
|
file://CVE-2023-26966.patch \
|
|
file://CVE-2022-40090.patch \
|
|
file://CVE-2023-1916.patch \
|
|
file://CVE-2023-40745.patch \
|
|
file://CVE-2023-41175.patch \
|
|
file://CVE-2023-6228.patch \
|
|
file://CVE-2023-52356.patch \
|
|
file://CVE-2023-6277-1.patch \
|
|
file://CVE-2023-6277-2.patch \
|
|
file://CVE-2023-6277-3.patch \
|
|
file://CVE-2023-6277-4.patch \
|
|
file://CVE-2024-7006.patch \
|
|
file://CVE-2023-3164.patch \
|
|
file://CVE-2025-8176-0001.patch \
|
|
file://CVE-2025-8176-0002.patch \
|
|
file://CVE-2025-8176-0003.patch \
|
|
file://CVE-2025-8177.patch \
|
|
file://CVE-2024-13978.patch \
|
|
file://CVE-2025-8534.patch \
|
|
file://CVE-2025-8851.patch \
|
|
file://CVE-2025-9900.patch \
|
|
file://CVE-2025-8961.patch \
|
|
file://CVE-2025-9165.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"
|
|
|
|
# exclude betas
|
|
UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar"
|
|
|
|
# Tested with check from https://security-tracker.debian.org/tracker/CVE-2015-7313
|
|
# and 4.3.0 doesn't have the issue
|
|
CVE_CHECK_IGNORE += "CVE-2015-7313"
|
|
# These issues only affect libtiff post-4.3.0 but before 4.4.0,
|
|
# caused by 3079627e and fixed by b4e79bfa and again by 9be22b63
|
|
CVE_CHECK_IGNORE += "CVE-2022-1622 CVE-2022-1623 CVE-2023-2731"
|
|
# Issue is in jbig which we don't enable
|
|
CVE_CHECK_IGNORE += "CVE-2022-1210"
|
|
|
|
inherit autotools multilib_header
|
|
|
|
CACHED_CONFIGUREVARS = "ax_cv_check_gl_libgl=no"
|
|
|
|
PACKAGECONFIG ?= "cxx jpeg zlib lzma \
|
|
strip-chopping extrasample-as-alpha check-ycbcr-subsampling"
|
|
|
|
PACKAGECONFIG[cxx] = "--enable-cxx,--disable-cxx,,"
|
|
PACKAGECONFIG[jbig] = "--enable-jbig,--disable-jbig,jbig,"
|
|
PACKAGECONFIG[jpeg] = "--enable-jpeg,--disable-jpeg,jpeg,"
|
|
PACKAGECONFIG[zlib] = "--enable-zlib,--disable-zlib,zlib,"
|
|
PACKAGECONFIG[lzma] = "--enable-lzma,--disable-lzma,xz,"
|
|
PACKAGECONFIG[webp] = "--enable-webp,--disable-webp,libwebp,"
|
|
|
|
# Convert single-strip uncompressed images to multiple strips of specified
|
|
# size (default: 8192) to reduce memory usage
|
|
PACKAGECONFIG[strip-chopping] = "--enable-strip-chopping,--disable-strip-chopping,,"
|
|
|
|
# Treat a fourth sample with no EXTRASAMPLE_ value as being ASSOCALPHA
|
|
PACKAGECONFIG[extrasample-as-alpha] = "--enable-extrasample-as-alpha,--disable-extrasample-as-alpha,,"
|
|
|
|
# Control picking up YCbCr subsample info. Disable to support files lacking
|
|
# the tag
|
|
PACKAGECONFIG[check-ycbcr-subsampling] = "--enable-check-ycbcr-subsampling,--disable-check-ycbcr-subsampling,,"
|
|
|
|
# Support a mechanism allowing reading large strips (usually one strip files)
|
|
# in chunks when using TIFFReadScanline. Experimental 4.0+ feature
|
|
PACKAGECONFIG[chunky-strip-read] = "--enable-chunky-strip-read,--disable-chunky-strip-read,,"
|
|
|
|
PACKAGES =+ "tiffxx tiff-utils"
|
|
FILES:tiffxx = "${libdir}/libtiffxx.so.*"
|
|
FILES:tiff-utils = "${bindir}/*"
|
|
|
|
do_install:append() {
|
|
oe_multilib_header tiffconf.h
|
|
}
|
|
|
|
BBCLASSEXTEND = "native nativesdk"
|