From 6aec9d4b683944960384338947d6036bd0937bf6 Mon Sep 17 00:00:00 2001 From: "Carsten Haitzler (Rasterman)" Date: Mon, 2 May 2016 07:52:48 +0900 Subject: [PATCH] Revert "tiff: disable by default as it is full of CVE with apparently no chance to get them fixed." This reverts commit b8860c88f52c7ea3576f88f9399b777646975bd5. i wouldn't call this full of CVE's: http://www.cvedetails.com/product/3881/Libtiff-Libtiff.html?vendor_id=2224 i do notice various CVE's on libtiff's mailing list have had patches committed. the CVE db doesn't track if the CVE has been fixed by upstream (in an easy to find way) and in which version or on what date so the CVE db simply is all CVE's since the dawn of time that were ever filed. --- configure.ac | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/configure.ac b/configure.ac index deafdd876a..2d38a43111 100644 --- a/configure.ac +++ b/configure.ac @@ -2008,7 +2008,7 @@ ARG_ENABLE_EVAS_IMAGE_LOADER(PMAPS, static) ARG_ENABLE_EVAS_IMAGE_LOADER(PNG, static) ARG_ENABLE_EVAS_IMAGE_LOADER(PSD, static) ARG_ENABLE_EVAS_IMAGE_LOADER(Tga, static) -ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, no) +ARG_ENABLE_EVAS_IMAGE_LOADER(Tiff, yes) ARG_ENABLE_EVAS_IMAGE_LOADER(WBMP, static) ARG_ENABLE_EVAS_IMAGE_LOADER(WEBP, no) ARG_ENABLE_EVAS_IMAGE_LOADER(XPM, static)