Name tiff
Version 4.1.0
Summary Provides support for the Tag Image File Format (TIFF)
Description Library provides support for the Tag Image File Format (TIFF), a widely used format for storing image data. This library provide means to easily access and create TIFF image files.
Section base
License BSD-2-Clause
Homepage http://www.libtiff.org/
Recipe file recipes-multimedia/libtiff/tiff_4.1.0.bb
Layer openembedded-core (dunfell branch)
Inherits
  • autotools
  • multilib_header
  • siteconfig
  • siteinfo
Dependencies
  • autoconf-native
  • automake-native
  • gnu-config-native
  • jpeg
  • libtool-cross
  • libtool-native
  • virtual/i686-oe-linux-compilerlibs
  • virtual/i686-oe-linux-gcc
  • virtual/libc
  • xz
  • zlib
  • jpeg
  • xz
  • zlib
PACKAGECONFIG options
  • check-ycbcr-subsampling
  • chunky-strip-read
  • cxx
  • extrasample-as-alpha
  • jpeg
  • lzma
  • strip-chopping
  • zlib

Sources

http://download.osgeo.org/libtiff/tiff-4.1.0.tar.gz

Patches

Patch Status
files/CVE-2020-35523.patch Backport [ https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2 ]
files/CVE-2020-35524-1.patch Backport
files/CVE-2020-35524-2.patch Backport
files/001_support_patch_for_CVE-2020-35521_and_CVE-2020-35522.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/02875964eba5c4a2ea98c41562835428214adfe7.patch]
files/002_support_patch_for_CVE-2020-35521_and_CVE-2020-35522.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/ca70b5e702b9f503333344b2d46691de9feae84e.patch]
files/CVE-2020-35521_and_CVE-2020-35522.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/b5a935d96b21cda0f434230cdf8ca958cd8b4eef.patch]
files/0001-tiffset-fix-global-buffer-overflow-for-ASCII-tags-wh.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/03047a26952a82daaa0792957ce211e0aa51bc64]
tiff/561599c99f987dc32ae110370cfdd7df7975586b.patch Backport
tiff/eecb0712f4c3a5b449f70c57988260a667ddbdef.patch Backport
files/CVE-2022-0865.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0865.patch/]
files/CVE-2022-0908.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0908.patch/]
files/CVE-2022-0907.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0907.patch/]
files/CVE-2022-0909.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0909.patch/]
files/CVE-2022-0891.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0891.patch/]
files/CVE-2022-0924.patch Backport [https://sources.debian.org/src/tiff/4.1.0+git191117-2%7Edeb10u4/debian/patches/CVE-2022-0924.patch/]
files/CVE-2022-2056-CVE-2022-2057-CVE-2022-2058.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/dd1bcc7abb26094e93636e85520f0d8f81ab0fab]
files/CVE-2022-34526.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/275735d0354e39c0ac1dc3c0db2120d6f31d1990]
files/CVE-2022-2867-CVE-2022-2868-CVE-2022-2869.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/07d79fcac2ead271b60e32aeb80f7b4f3be9ac8c]
tiff/CVE-2022-1354.patch Backport
tiff/CVE-2022-1355.patch Backport
files/CVE-2022-3570_3598.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2022-3597_3626_3627.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2022-3599.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2022-3970.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2022-48281.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz]
files/CVE-2023-0795_0796_0797_0798_0799.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2023-0800_0801_0802_0803_0804.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u7.debian.tar.xz ]
files/CVE-2023-1916.patch Submitted [https://gitlab.com/libtiff/libtiff/-/commit/848434a81c443f59ec90d41218eba6e48a450a11 https://gitlab.com/libtiff/libtiff/-/merge_requests/535]
files/CVE-2023-25433.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/9c22495e5eeeae9e00a1596720c969656bb8d678 && https://gitlab.com/libtiff/libtiff/-/commit/688012dca2c39033aa2dc7bcea9796787cfd1b44]
files/CVE-2023-25434-CVE-2023-25435.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/69818e2f2d246e6631ac2a2da692c3706b849c38]
files/CVE-2023-26965.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u8.debian.tar.xz]
files/CVE-2023-26966.patch Backport [import from debian http://security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u8.debian.tar.xz]
files/CVE-2023-2908.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f]
files/CVE-2023-3316.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/d63de61b1ec3385f6383ef9a1f453e4b8b11d536]
files/CVE-2023-3576.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/881a070194783561fd209b7c789a4e75566f7f37]
files/CVE-2023-3618.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/b5c7d4c4e03333ac16b5cfb11acaaeaa493334f8]
files/CVE-2023-40745.patch Backport from [https://gitlab.com/libtiff/libtiff/-/commit/4fc16f649fa2875d5c388cf2edc295510a247ee5]
files/CVE-2023-41175.patch Backport [import from debian security.debian.org/debian-security/pool/updates/main/t/tiff/tiff_4.1.0+git191117-2~deb10u8.debian.tar.xz
files/CVE-2022-40090.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2022-40090.patch?h=ubuntu/focal-security
files/CVE-2023-6228.patch Backport [https://gitlab.com/libtiff/libtiff/-/commit/1e7d217a323eac701b134afc4ae39b6bdfdbc96a]
files/CVE-2023-6277-1.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2023-6277-1.patch?h=ubuntu/focal-security
files/CVE-2023-6277-2.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2023-6277-2.patch?h=ubuntu/focal-security
files/CVE-2023-6277-3.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2023-6277-3.patch?h=ubuntu/focal-security
files/CVE-2023-6277-4.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2023-6277-4.patch?h=ubuntu/focal-security
files/CVE-2023-52356.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/tiff/tree/debian/patches/CVE-2023-52356.patch?h=ubuntu/focal-security

bbappends

This recipe is appended by:

meta-arago-distro tiff_%.bbappend

Other branches

This recipe in other branches of openembedded-core:

Branch Recipe
master tiff 4.7.0
styhead (Yocto Project 5.1) tiff 4.6.0
scarthgap (Yocto Project 5.0) tiff 4.6.0
nanbield (Yocto Project 4.3) tiff 4.6.0
mickledore (Yocto Project 4.2) tiff 4.5.1
langdale (Yocto Project 4.1) tiff 4.4.0
kirkstone (Yocto Project 4.0) tiff 4.3.0
honister (Yocto Project 3.4) tiff 4.3.0
hardknott (Yocto Project 3.3) tiff 4.2.0
gatesgarth (Yocto Project 3.2) tiff 4.1.0
dunfell (Yocto Project 3.1) tiff 4.1.0 (this recipe)
zeus (Yocto Project 3.0) tiff 4.0.10
warrior (Yocto Project 2.7) tiff 4.0.10
thud (Yocto Project 2.6) tiff 4.0.9
sumo (Yocto Project 2.5) tiff 4.0.9
rocko (Yocto Project 2.4) tiff 4.0.8
pyro (Yocto Project 2.3) tiff 4.0.7
morty (Yocto Project 2.2) tiff 4.0.7
krogoth (Yocto Project 2.1) tiff 4.0.6
jethro (Yocto Project 2.0) tiff 4.0.4
fido (Yocto Project 1.8) tiff 4.0.3
dizzy (Yocto Project 1.7) tiff 4.0.3
daisy (Yocto Project 1.6) tiff 4.0.3
dora (Yocto Project 1.5) tiff 4.0.3
dylan (Yocto Project 1.4) tiff 4.0.3
danny (Yocto Project 1.3) tiff 4.0.2