diff options
author | drochner <drochner> | 2007-09-13 19:16:01 +0000 |
---|---|---|
committer | drochner <drochner> | 2007-09-13 19:16:01 +0000 |
commit | 0b74b9a0d4ed707ced78074bd843b58c1d7f74a1 (patch) | |
tree | 8cee033d941914021ef4a28fb02e2c9c627632ff /multimedia/gmplayer/Makefile | |
parent | 492e905e766d95fa074b668e19b292628e70020a (diff) | |
download | pkgsrc-0b74b9a0d4ed707ced78074bd843b58c1d7f74a1.tar.gz |
apply a security fix from upstream CVS:
Check wLongsPerEntry before using it.
This fixes a potential crash for some values of it.
As a side effect it works around broken callocs with an integer
overflow vulnerability, but using MPlayer on such systems should
never be assumed to be safe!
This should fix SA26806 (http://secunia.com/advisories/26806/).
bump PKGREVISIONs
Diffstat (limited to 'multimedia/gmplayer/Makefile')
-rw-r--r-- | multimedia/gmplayer/Makefile | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/multimedia/gmplayer/Makefile b/multimedia/gmplayer/Makefile index 6c0e9f536b5..b349d84fcf6 100644 --- a/multimedia/gmplayer/Makefile +++ b/multimedia/gmplayer/Makefile @@ -1,4 +1,4 @@ -# $NetBSD: Makefile,v 1.62 2007/09/07 10:06:22 tron Exp $ +# $NetBSD: Makefile,v 1.63 2007/09/13 19:16:02 drochner Exp $ # # NOTE: if you are updating both mplayer and gmplayer, you must ensure @@ -9,7 +9,7 @@ # PKGNAME= gmplayer-${MPLAYER_PKG_VERSION} -PKGREVISION= 3 +PKGREVISION= 4 BROKEN_IN= pkgsrc-2006Q4 |