diff options
author | drochner <drochner@pkgsrc.org> | 2007-09-13 19:16:01 +0000 |
---|---|---|
committer | drochner <drochner@pkgsrc.org> | 2007-09-13 19:16:01 +0000 |
commit | 3a7069df431d892e971bbbbb38badadec6132090 (patch) | |
tree | 8cee033d941914021ef4a28fb02e2c9c627632ff /multimedia/mplayer | |
parent | 146368a8acb07c5e1d4f799391c09a061bacfc7c (diff) | |
download | pkgsrc-3a7069df431d892e971bbbbb38badadec6132090.tar.gz |
apply a security fix from upstream CVS:
Check wLongsPerEntry before using it.
This fixes a potential crash for some values of it.
As a side effect it works around broken callocs with an integer
overflow vulnerability, but using MPlayer on such systems should
never be assumed to be safe!
This should fix SA26806 (http://secunia.com/advisories/26806/).
bump PKGREVISIONs
Diffstat (limited to 'multimedia/mplayer')
-rw-r--r-- | multimedia/mplayer/Makefile | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/multimedia/mplayer/Makefile b/multimedia/mplayer/Makefile index 6abb5f40199..e7b29b803d6 100644 --- a/multimedia/mplayer/Makefile +++ b/multimedia/mplayer/Makefile @@ -1,7 +1,7 @@ -# $NetBSD: Makefile,v 1.45 2007/09/07 10:06:22 tron Exp $ +# $NetBSD: Makefile,v 1.46 2007/09/13 19:16:01 drochner Exp $ PKGNAME= mplayer-${MPLAYER_PKG_VERSION} -PKGREVISION= 8 +PKGREVISION= 9 COMMENT= Software-only MPEG-1/2/4 video decoder |