summaryrefslogtreecommitdiff
path: root/graphics/mplayer
diff options
context:
space:
mode:
authorsalo <salo@pkgsrc.org>2003-09-26 12:04:46 +0000
committersalo <salo@pkgsrc.org>2003-09-26 12:04:46 +0000
commitb5856856126434a5f97941db8e40288bb85a6cb5 (patch)
treedb9d4d6f5fc5b7823092317d9e6a1fd94571f8e8 /graphics/mplayer
parentd2dc939936b42ac4f753a07c6348a34720b7cdc8 (diff)
downloadpkgsrc-b5856856126434a5f97941db8e40288bb85a6cb5.tar.gz
PKGREVISION++
Fix remotely exploitable buffer overflow vulnerability. A malicious host can craft a harmful ASX header, and trick MPlayer into executing arbitrary code upon parsing that header. http://www.mplayerhq.hu/homepage/design6/news.html
Diffstat (limited to 'graphics/mplayer')
-rw-r--r--graphics/mplayer/distinfo3
1 files changed, 2 insertions, 1 deletions
diff --git a/graphics/mplayer/distinfo b/graphics/mplayer/distinfo
index 55333815bd0..b173b9adf09 100644
--- a/graphics/mplayer/distinfo
+++ b/graphics/mplayer/distinfo
@@ -1,7 +1,8 @@
-$NetBSD: distinfo,v 1.37 2003/09/19 10:13:41 wiz Exp $
+$NetBSD: distinfo,v 1.38 2003/09/26 12:04:46 salo Exp $
SHA1 (mplayer/MPlayer-1.0pre1.tar.bz2) = 34482db6102a0d4b2a3692617926a92e44116f81
Size (mplayer/MPlayer-1.0pre1.tar.bz2) = 4190784 bytes
SHA1 (patch-aa) = 6938dbdccb9b760dadad304f3bf61245e8b1baa6
+SHA1 (patch-ab) = a9765eaba21c68242bf106b6d679af851d6480fb
SHA1 (patch-ad) = e77e938e7f4b9a2849f816bbc662db277d7898d3
SHA1 (patch-ae) = 12d16a7dda6be9d950d09d23d41d0de03ca70425