diff options
Diffstat (limited to 'meta/recipes-multimedia/libtiff/tiff_4.1.0.bb')
-rw-r--r-- | meta/recipes-multimedia/libtiff/tiff_4.1.0.bb | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.1.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.1.0.bb index 1f92c18513..7efaba3a38 100644 --- a/meta/recipes-multimedia/libtiff/tiff_4.1.0.bb +++ b/meta/recipes-multimedia/libtiff/tiff_4.1.0.bb | |||
@@ -1,10 +1,59 @@ | |||
1 | SUMMARY = "Provides support for the Tag Image File Format (TIFF)" | 1 | SUMMARY = "Provides support for the Tag Image File Format (TIFF)" |
2 | DESCRIPTION = "Library provides support for the Tag Image File Format \ | ||
3 | (TIFF), a widely used format for storing image data. This library \ | ||
4 | provide means to easily access and create TIFF image files." | ||
5 | HOMEPAGE = "http://www.libtiff.org/" | ||
2 | LICENSE = "BSD-2-Clause" | 6 | LICENSE = "BSD-2-Clause" |
3 | LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=34da3db46fab7501992f9615d7e158cf" | 7 | LIC_FILES_CHKSUM = "file://COPYRIGHT;md5=34da3db46fab7501992f9615d7e158cf" |
4 | 8 | ||
5 | CVE_PRODUCT = "libtiff" | 9 | CVE_PRODUCT = "libtiff" |
6 | 10 | ||
7 | SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ | 11 | SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \ |
12 | file://CVE-2020-35523.patch \ | ||
13 | file://CVE-2020-35524-1.patch \ | ||
14 | file://CVE-2020-35524-2.patch \ | ||
15 | file://001_support_patch_for_CVE-2020-35521_and_CVE-2020-35522.patch \ | ||
16 | file://002_support_patch_for_CVE-2020-35521_and_CVE-2020-35522.patch \ | ||
17 | file://CVE-2020-35521_and_CVE-2020-35522.patch \ | ||
18 | file://0001-tiffset-fix-global-buffer-overflow-for-ASCII-tags-wh.patch \ | ||
19 | file://561599c99f987dc32ae110370cfdd7df7975586b.patch \ | ||
20 | file://eecb0712f4c3a5b449f70c57988260a667ddbdef.patch \ | ||
21 | file://CVE-2022-0865.patch \ | ||
22 | file://CVE-2022-0908.patch \ | ||
23 | file://CVE-2022-0907.patch \ | ||
24 | file://CVE-2022-0909.patch \ | ||
25 | file://CVE-2022-0891.patch \ | ||
26 | file://CVE-2022-0924.patch \ | ||
27 | file://CVE-2022-2056-CVE-2022-2057-CVE-2022-2058.patch \ | ||
28 | file://CVE-2022-34526.patch \ | ||
29 | file://CVE-2022-2867-CVE-2022-2868-CVE-2022-2869.patch \ | ||
30 | file://CVE-2022-1354.patch \ | ||
31 | file://CVE-2022-1355.patch \ | ||
32 | file://CVE-2022-3570_3598.patch \ | ||
33 | file://CVE-2022-3597_3626_3627.patch \ | ||
34 | file://CVE-2022-3599.patch \ | ||
35 | file://CVE-2022-3970.patch \ | ||
36 | file://CVE-2022-48281.patch \ | ||
37 | file://CVE-2023-0795_0796_0797_0798_0799.patch \ | ||
38 | file://CVE-2023-0800_0801_0802_0803_0804.patch \ | ||
39 | file://CVE-2023-1916.patch \ | ||
40 | file://CVE-2023-25433.patch \ | ||
41 | file://CVE-2023-25434-CVE-2023-25435.patch \ | ||
42 | file://CVE-2023-26965.patch \ | ||
43 | file://CVE-2023-26966.patch \ | ||
44 | file://CVE-2023-2908.patch \ | ||
45 | file://CVE-2023-3316.patch \ | ||
46 | file://CVE-2023-3576.patch \ | ||
47 | file://CVE-2023-3618.patch \ | ||
48 | file://CVE-2023-40745.patch \ | ||
49 | file://CVE-2023-41175.patch \ | ||
50 | file://CVE-2022-40090.patch \ | ||
51 | file://CVE-2023-6228.patch \ | ||
52 | file://CVE-2023-6277-1.patch \ | ||
53 | file://CVE-2023-6277-2.patch \ | ||
54 | file://CVE-2023-6277-3.patch \ | ||
55 | file://CVE-2023-6277-4.patch \ | ||
56 | file://CVE-2023-52356.patch \ | ||
8 | " | 57 | " |
9 | SRC_URI[md5sum] = "2165e7aba557463acc0664e71a3ed424" | 58 | SRC_URI[md5sum] = "2165e7aba557463acc0664e71a3ed424" |
10 | SRC_URI[sha256sum] = "5d29f32517dadb6dbcd1255ea5bbc93a2b54b94fbf83653b4d65c7d6775b8634" | 59 | SRC_URI[sha256sum] = "5d29f32517dadb6dbcd1255ea5bbc93a2b54b94fbf83653b4d65c7d6775b8634" |
@@ -12,6 +61,10 @@ SRC_URI[sha256sum] = "5d29f32517dadb6dbcd1255ea5bbc93a2b54b94fbf83653b4d65c7d677 | |||
12 | # exclude betas | 61 | # exclude betas |
13 | UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar" | 62 | UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar" |
14 | 63 | ||
64 | # Tested with check from https://security-tracker.debian.org/tracker/CVE-2015-7313 | ||
65 | # and 4.1.0 doesn't have the issue | ||
66 | CVE_CHECK_WHITELIST += "CVE-2015-7313" | ||
67 | |||
15 | inherit autotools multilib_header | 68 | inherit autotools multilib_header |
16 | 69 | ||
17 | CACHED_CONFIGUREVARS = "ax_cv_check_gl_libgl=no" | 70 | CACHED_CONFIGUREVARS = "ax_cv_check_gl_libgl=no" |