|author||Carsten Haitzler (Rasterman) <email@example.com>||2016-05-02 07:52:48 +0900|
|committer||Carsten Haitzler (Rasterman) <firstname.lastname@example.org>||2016-05-02 08:02:09 +0900|
Revert "tiff: disable by default as it is full of CVE with apparently no chance to get them fixed."
This reverts commit b8860c88f52c7ea3576f88f9399b777646975bd5. i wouldn't call this full of CVE's: http://www.cvedetails.com/product/3881/Libtiff-Libtiff.html?vendor_id=2224 i do notice various CVE's on libtiff's mailing list have had patches committed. the CVE db doesn't track if the CVE has been fixed by upstream (in an easy to find way) and in which version or on what date so the CVE db simply is all CVE's since the dawn of time that were ever filed.
Diffstat (limited to 'configure.ac')
1 files changed, 1 insertions, 1 deletions
|@@ -2008,7 +2008,7 @@ ARG_ENABLE_EVAS_IMAGE_LOADER(PMAPS, static)|
|2008||ARG_ENABLE_EVAS_IMAGE_LOADER(PNG, static)||2008||ARG_ENABLE_EVAS_IMAGE_LOADER(PNG, static)|
|2009||ARG_ENABLE_EVAS_IMAGE_LOADER(PSD, static)||2009||ARG_ENABLE_EVAS_IMAGE_LOADER(PSD, static)|
|2010||ARG_ENABLE_EVAS_IMAGE_LOADER(Tga, static)||2010||ARG_ENABLE_EVAS_IMAGE_LOADER(Tga, static)|
|2011||ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, no)||2011||ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, yes)|
|2012||ARG_ENABLE_EVAS_IMAGE_LOADER(WBMP, static)||2012||ARG_ENABLE_EVAS_IMAGE_LOADER(WBMP, static)|
|2013||ARG_ENABLE_EVAS_IMAGE_LOADER(WEBP, no)||2013||ARG_ENABLE_EVAS_IMAGE_LOADER(WEBP, no)|
|2014||ARG_ENABLE_EVAS_IMAGE_LOADER(XPM, static)||2014||ARG_ENABLE_EVAS_IMAGE_LOADER(XPM, static)|