Path to this page:
./
graphics/pngcheck,
Verify the integrity of PNG, JNG, and MNG files
Branch: CURRENT,
Version: 3.0.3,
Package name: pngcheck-3.0.3,
Maintainer: pkgsrc-userspngcheck verifies the integrity of PNG, JNG, and MNG files (by
checking the internal 32-bit CRCs [checksums] and decompressing
the image data); it can optionally dump almost all of the chunk-level
information in the image in human-readable form. For example, it
can be used to print the basic statistics about an image (dimensions,
bit depth, etc.); to list the color and transparency info in its
palette (assuming it has one); or to extract the embedded text
annotations. This is a command-line program with batch capabilities.
Required to build:[
pkgtools/cwrappers]
Master sites:
Filesize: 62.271 KB
Version history: (Expand)
- (2022-12-14) Updated to version: pngcheck-3.0.3
- (2017-11-23) Package has been reborn
- (2011-03-23) Updated to version: pngcheck-2.3.0
- (2006-12-08) Package added to pkgsrc.se, version pngcheck-2.2.0 (created)
CVS history: (Expand)
2022-12-14 15:33:24 by Frederic Cambus | Files touched by this commit (2) | |
Log message:
pngcheck: update to 3.0.3.
* ChangeLog (oldest first):
* 20070709 GRR: tweaked color definitions slightly to work better on terminals
* with white/light backgrounds
* 20070712 GRR: added Makefile.mingw32
* 20100504 GRR: fixed DHDR (pre-MNG-1.0) bug identified by Winfried \
<szukw000@arcor.de>
* 20170713 GRP: added eXIf support (GRR: added check for II/MM/unknown format)
* 20201012 BB: converted static const help/usage-related strings to macros so
* -Werror=format-security doesn't trigger (Ben Beasley)
* 20201015 BB: added (help2man-generated) man pages for all three utils
* 20201017 GRR: added top-level LICENSE file; fixed various compiler warnings
* 20201031 GRR: replaced gpl/COPYING (outdated address, references to Library
* GPL) with https://www.gnu.org/licenses/old-licenses/gpl-2.0.txt
* (thanks to Ben Beasley for catching that)
* 20201031 GRR: released version 2.4.0
* ----------------------
* 20201113 BB: fixed buffer-overflow vulnerability discovered by "giantbranch
* of NSFOCUS Security Team"
* https://bugzilla.redhat.com/show_bug.cgi?id=1897485
* 20201128 BB: found and fixed four additional vulnerabilities (null-pointer
* dereference and three buffer overruns)
* 20201209 LP: fixed an off-by-one bug in check_magic() (Lucy Phipps)
* 20201209 LL: converted two zlib-version warnings/errors to go to stderr
* (Lemures Lemniscati, actually from 20180318; forwarded by LP)
* 20201210 BB: fixed another buffer-overflow vulnerability discovered by
* "giantbranch of NSFOCUS Security Team"
* https://bugzilla.redhat.com/show_bug.cgi?id=1905775
* 20201212 GRR: removed -f ("force") option due to multiple security \
issues
* 20201212 GRR: released version 3.0.0
* ----------------------
* 20201214 BB: generalized previous sPLT buffer-overrun fix, and found and
* fixed a PPLT vulnerability
* 20210124 GRR: released version 3.0.1
* ----------------------
* 20201217 BB: fixed a crash bug (and probable vulnerability) in large (MNG)
* LOOP chunks
* 20210131 GRR: updated Makefile.mingw32 for modern versions and added
* Makefile.mingw64 (targets Win64); both are essentially
* UNTESTED, however!
* 20210131 GRR: released version 3.0.2
* ----------------------
* 20210416 BB: fixed a divide-by-zero crash bug (and probable vulnerability)
* in interlaced images with extra compressed data beyond the
* nominal end of the image data (found by "chiba of topsec alpha
* lab")
* 20210425 GRR: released version 3.0.3
* ----------------------
|
2021-10-26 12:47:26 by Nia Alarie | Files touched by this commit (800) |
Log message:
graphics: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
|
2021-10-07 16:13:27 by Nia Alarie | Files touched by this commit (800) |
Log message:
graphics: Remove SHA1 hashes for distfiles
|
2015-11-03 22:34:36 by Alistair G. Crooks | Files touched by this commit (610) |
Log message:
Add SHA512 digests for distfiles for graphics category
Problems found with existing digests:
Package fotoxx distfile fotoxx-14.03.1.tar.gz
ac2033f87de2c23941261f7c50160cddf872c110 [recorded]
118e98a8cc0414676b3c4d37b8df407c28a1407c [calculated]
Package ploticus-examples distfile ploticus-2.00/plnode200.tar.gz
34274a03d0c41fae5690633663e3d4114b9d7a6d [recorded]
da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated]
Problems found locating distfiles:
Package AfterShotPro: missing distfile AfterShotPro-1.1.0.30/AfterShotPro_i386.deb
Package pgraf: missing distfile pgraf-20010131.tar.gz
Package qvplay: missing distfile qvplay-0.95.tar.gz
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
|
2012-10-06 16:11:27 by Aleksej Saushev | Files touched by this commit (427) |
Log message:
Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.
|
2011-03-23 11:56:55 by Adam Ciarcinski | Files touched by this commit (2) |
Log message:
Changes 2.3.0:
This version adds a new ANSI-colorized-output option (probably optimized for
dark-background xterms) and more informative output for interlaced images.
|
2009-06-14 19:59:32 by Joerg Sonnenberger | Files touched by this commit (263) |
Log message:
Remove @dirrm entries from PLISTs
|
2008-03-04 16:39:11 by Johnny C. Lam | Files touched by this commit (46) |
Log message:
Mechanical changes to add DESTDIR support to packages that install
their files via a custom do-install target.
|