./graphics/pngcheck, Verify the integrity of PNG, JNG, and MNG files

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 3.0.3, Package name: pngcheck-3.0.3, Maintainer: pkgsrc-users

pngcheck verifies the integrity of PNG, JNG, and MNG files (by
checking the internal 32-bit CRCs [checksums] and decompressing
the image data); it can optionally dump almost all of the chunk-level
information in the image in human-readable form. For example, it
can be used to print the basic statistics about an image (dimensions,
bit depth, etc.); to list the color and transparency info in its
palette (assuming it has one); or to extract the embedded text
annotations. This is a command-line program with batch capabilities.


Required to build:
[pkgtools/cwrappers]

Master sites:

Filesize: 62.271 KB

Version history: (Expand)


CVS history: (Expand)


   2022-12-14 15:33:24 by Frederic Cambus | Files touched by this commit (2) | Package updated
Log message:
pngcheck: update to 3.0.3.

 * ChangeLog (oldest first):

 * 20070709 GRR: tweaked color definitions slightly to work better on terminals
 *               with white/light backgrounds
 * 20070712 GRR: added Makefile.mingw32
 * 20100504 GRR: fixed DHDR (pre-MNG-1.0) bug identified by Winfried \ 
<szukw000@arcor.de>
 * 20170713 GRP: added eXIf support (GRR: added check for II/MM/unknown format)
 * 20201012 BB:  converted static const help/usage-related strings to macros so
 *               -Werror=format-security doesn't trigger (Ben Beasley)
 * 20201015 BB:  added (help2man-generated) man pages for all three utils
 * 20201017 GRR: added top-level LICENSE file; fixed various compiler warnings
 * 20201031 GRR: replaced gpl/COPYING (outdated address, references to Library
 *               GPL) with https://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
 *               (thanks to Ben Beasley for catching that)
 * 20201031 GRR: released version 2.4.0
 *               ----------------------
 * 20201113 BB:  fixed buffer-overflow vulnerability discovered by "giantbranch
 *               of NSFOCUS Security Team"
 *               https://bugzilla.redhat.com/show_bug.cgi?id=1897485
 * 20201128 BB:  found and fixed four additional vulnerabilities (null-pointer
 *               dereference and three buffer overruns)
 * 20201209 LP:  fixed an off-by-one bug in check_magic() (Lucy Phipps)
 * 20201209 LL:  converted two zlib-version warnings/errors to go to stderr
 *               (Lemures Lemniscati, actually from 20180318; forwarded by LP)
 * 20201210 BB:  fixed another buffer-overflow vulnerability discovered by
 *               "giantbranch of NSFOCUS Security Team"
 *               https://bugzilla.redhat.com/show_bug.cgi?id=1905775
 * 20201212 GRR: removed -f ("force") option due to multiple security \ 
issues
 * 20201212 GRR: released version 3.0.0
 *               ----------------------
 * 20201214 BB:  generalized previous sPLT buffer-overrun fix, and found and
 *               fixed a PPLT vulnerability
 * 20210124 GRR: released version 3.0.1
 *               ----------------------
 * 20201217 BB:  fixed a crash bug (and probable vulnerability) in large (MNG)
 *               LOOP chunks
 * 20210131 GRR: updated Makefile.mingw32 for modern versions and added
 *               Makefile.mingw64 (targets Win64); both are essentially
 *               UNTESTED, however!
 * 20210131 GRR: released version 3.0.2
 *               ----------------------
 * 20210416 BB:  fixed a divide-by-zero crash bug (and probable vulnerability)
 *               in interlaced images with extra compressed data beyond the
 *               nominal end of the image data (found by "chiba of topsec alpha
 *               lab")
 * 20210425 GRR: released version 3.0.3
 *               ----------------------
   2021-10-26 12:47:26 by Nia Alarie | Files touched by this commit (800)
Log message:
graphics: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes
   2021-10-07 16:13:27 by Nia Alarie | Files touched by this commit (800)
Log message:
graphics: Remove SHA1 hashes for distfiles
   2015-11-03 22:34:36 by Alistair G. Crooks | Files touched by this commit (610)
Log message:
Add SHA512 digests for distfiles for graphics category

Problems found with existing digests:
	Package fotoxx distfile fotoxx-14.03.1.tar.gz
	ac2033f87de2c23941261f7c50160cddf872c110 [recorded]
	118e98a8cc0414676b3c4d37b8df407c28a1407c [calculated]
	Package ploticus-examples distfile ploticus-2.00/plnode200.tar.gz
	34274a03d0c41fae5690633663e3d4114b9d7a6d [recorded]
	da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated]

Problems found locating distfiles:
	Package AfterShotPro: missing distfile AfterShotPro-1.1.0.30/AfterShotPro_i386.deb
	Package pgraf: missing distfile pgraf-20010131.tar.gz
	Package qvplay: missing distfile qvplay-0.95.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2012-10-06 16:11:27 by Aleksej Saushev | Files touched by this commit (427)
Log message:
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.
   2011-03-23 11:56:55 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
Changes 2.3.0:
This version adds a new ANSI-colorized-output option (probably optimized for
dark-background xterms) and more informative output for interlaced images.
   2009-06-14 19:59:32 by Joerg Sonnenberger | Files touched by this commit (263)
Log message:
Remove @dirrm entries from PLISTs
   2008-03-04 16:39:11 by Johnny C. Lam | Files touched by this commit (46)
Log message:
Mechanical changes to add DESTDIR support to packages that install
their files via a custom do-install target.