Commit Graph

165 Commits

Author SHA1 Message Date
naddy
e9a2791988 graphics/png: update to 1.6.38
* Fixed various errors in the handling of tRNS, hIST and eXIf.
* Implemented many stability improvements across all platforms.

from Brad
2022-10-17 23:19:35 +00:00
gkoehler
962973c019 Unbreak png on powerpc64 by passing -mvsx
Diff from Brad Smith, edited by me
2022-08-01 15:00:04 +00:00
phessler
56173980fc Enable png's SIMD support.
Tested on amd64 by Brad, and on arm64 by me.

From Brad
2022-07-22 05:50:47 +00:00
naddy
af6a79943b drop RCS Ids 2022-03-11 19:22:04 +00:00
espie
9501bc9fbd add debug for jpeg/png
okay sthen@
2019-11-24 17:21:24 +00:00
sthen
3318ced016 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:46:54 +00:00
naddy
68f9022f57 Security update of graphics/png to 1.6.37:
CVE-2019-7317: use-after-free in png_image_free()

Switch library soname from libpng16.so to libpng.so by changing the primary
name in the build.  Bump major version.

ok sthen@
2019-04-30 14:46:48 +00:00
solene
21e590fbf0 Update to png-1.6.35
ok jca@ naddy@ sthen@
patch sent upstream by tb@ to fix an implicit declaration warning
2018-08-13 13:31:39 +00:00
rsadowski
4f2e003d27 Update png to 1.6.34
ok naddy@
2017-10-26 16:53:10 +00:00
rsadowski
02b3cb0898 Security update png to 1.6.32.
"libpng version 1.6.31 added png_handle_eXIf(), which has a
null-pointer-dereference bug as well as a potential memory leak. Insofar as the
function has existed for only four weeks and the chunk itself for only six,
it's unlikely there are any applications affected by it at this time, but they
might come into existence in the future. The vulnerability is fixed in version
1.6.32, released on 24 August 2017."

ok naddy@
2017-10-15 21:40:30 +00:00
naddy
762523bd1b Maintenance update to 1.6.31. This adds eXIf chunk support. 2017-08-12 03:05:29 +00:00
naddy
2770319302 maintenance update to 1.6.29 2017-04-11 14:15:09 +00:00
naddy
a8a51cae8a maintenance update to 1.6.28; from Brad 2017-01-18 22:12:32 +00:00
naddy
3f14f0f511 security update to 1.6.27 for null-pointer-dereference bug; from Brad 2016-12-31 16:51:27 +00:00
naddy
36c0d2f027 maintenance update to 1.6.26; from Brad 2016-11-01 17:29:38 +00:00
sthen
4088fdc338 update to libpng-1.6.25 2016-09-06 11:45:12 +00:00
naddy
d3de797133 maintenance update to 1.6.24; from Brad 2016-08-20 20:52:53 +00:00
naddy
6dd43b6f6c maintenance update to 1.6.23 after Brad sent me an equivalent diff for .22 2016-06-14 17:26:19 +00:00
naddy
c253f424ca garbage collect CONFIGURE_SHARED 2016-03-11 19:59:11 +00:00
naddy
a431532192 SECURITY update to 1.6.20:
Complete fix for CVE-2015-8126: buffer overflow in png_set_PLTE
2015-12-04 21:27:58 +00:00
naddy
196a3a3002 SECURITY update to 1.6.19:
Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
CVE-2015-8126

ok sthen@
2015-11-14 20:27:09 +00:00
naddy
4cd7f97ec6 explicitly replace symlink with file and use sed -i 2015-10-09 15:28:24 +00:00
sthen
958368e3a2 revert previous; libpng.la is a symlink and sed -i doesn't operate on these
(so build as-is fails), switching to operating on libpng16.la results in a
plist change, and the installed files from the previous package do actually
have a difference between libpng.la and libpng16.la(?!).
2015-10-08 23:45:30 +00:00
jasper
3e8b310348 sed -i 2015-10-08 12:02:03 +00:00
naddy
3b3aab2dd2 maintenance update to 1.6.18; from Brad, carefully checked by yours truly 2015-08-13 20:59:38 +00:00
naddy
65337c6c57 maintenance update to 1.6.17; from Brad 2015-05-06 20:17:48 +00:00
brad
f65d14f4e8 Update to png 1.6.16.
ok naddy@
2015-01-26 12:08:06 +00:00
brad
d00c176c8b Update to png 1.6.15.
ok naddy@
2014-11-25 22:41:50 +00:00
brad
999de3ec3b Update to png 1.6.14.
ok naddy@
2014-11-02 03:12:42 +00:00
brad
4cfe917ce3 Update to png 1.6.13.
ok naddy@
2014-10-16 17:18:42 +00:00
brad
46cfcf34aa Update to png 1.6.12.
ok sthen@
2014-07-17 23:01:58 +00:00
brad
e250d602a9 SECURITY Update to png 1.6.10:
libpng will hang when reading images that have zero-length IDAT chunks with
the progressive (streaming) reader; a malicious web site could use this bug
to cause a (minor) denial of service. (CVE-2014-0333)

ok sthen@
2014-04-18 02:54:05 +00:00
naddy
02270920a7 SECURITY update to 1.6.8:
Fix a null pointer dereference (CVE-2013-6954)
2014-01-03 15:53:04 +00:00
naddy
60b50fde16 Update to 1.6.6: fixes build on ARM, no other changes.
From: Juan Francisco Cantero Hurtado
2013-10-05 22:04:44 +00:00
brad
c0ae24e0f4 Update to png 1.6.5.
pngfix is commented out as it requires a newer zlib release.

ok naddy@
2013-09-16 20:10:01 +00:00
naddy
c201c477e8 also s/libpng16/libpng/ in libpng.la, otherwise libtool produces -lpng16 2013-06-09 15:13:03 +00:00
naddy
d569949d8c Major update to 1.6.2 on the new png 1.6 branch. 2013-06-08 19:39:28 +00:00
naddy
a6602dfa4e switch to autotools-based build and follow the upstream install layout 2013-06-03 02:46:25 +00:00
brad
b44b7e4b5b Update to png 1.5.15.
ok sthen@
2013-04-15 02:38:43 +00:00
brad
87ee19a888 Update to png 1.5.14.
Reinstates inter-library dependencies and corrects the libpng-config
and pkg-config files for static vs shared linking.

WANTLIB update and Ok naddy@
2013-03-25 00:21:37 +00:00
espie
e4fa65e765 PERMIT_* / REGRESS -> TEST sweep 2013-03-11 11:10:51 +00:00
sthen
70b6c6a8f2 bump various packages with static libs which frequently get pulled in;
this is to force pkg_add -u to pick them up because moving to PIE does change
these files but since there are no library bumps, the package signature stays
the same.

there are probably others, these are just ones I've run into. not a great
fix, and needs to be repeated when other arch move, but it's the simplest low
impact fix and I'm fed up with "relocation R_X86_64_32S can not be used
when making a shared object; recompile with -fPIC"
2012-10-12 15:06:37 +00:00
sthen
a26a1170e9 add DPB_PROPERTIES=Parallel for some things high in the dependency tree
which benefit from it.
2012-09-26 15:04:09 +00:00
naddy
5966c95102 SECURITY update to 1.5.10.
libpng failed to correctly handle malloc() failure for text chunks,
which can lead to memory corruption and the possibility of execution
of hostile code. (CVE-2011-3048)
2012-03-30 18:58:03 +00:00
naddy
c697fa7638 update to 1.5.9 2012-02-26 14:57:54 +00:00
sthen
bf0e713792 png SECURITY fix: CVE-2011-3026, heap-buffer-overflow in png_decompress_chunk 2012-02-17 15:44:13 +00:00
gsoares
b38fd19cea Fix for CVE-2011-3464
(libpng "png_formatted_warning()" Off-by-One Vulnerability)

patch came from upstream git:
(http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=
00c6a9a62c1825617c35c03ceb408114fffeca32)

OK sthen@
2012-02-03 18:23:14 +00:00
rpointel
883bb752a7 Update libpng to 1.5.6.
bump major version of shared libs.
ok naddy@.
2011-11-14 17:48:59 +00:00
sthen
378c061449 SECURITY update to png 1.5.5, fixing a divide-by-zero with malformed cHRM
chunks, this bug was introduced in 1.5.4 - CVE-2011-3328. Clues from naddy@
2011-09-23 21:00:28 +00:00
naddy
da9fdc4abc SECURITY update to png-1.5.4:
1. buffer overwrite in png_rgb_to_gray (CVE-2011-2690)
2. crash in png_default_error due to use of NULL Pointer (CVE-2011-2691)
3. memory corruption when handling empty sCAL chunks (CVE-2011-2692)
2011-07-15 11:10:40 +00:00