diff options
author | drochner <drochner> | 2007-09-13 19:16:01 +0000 |
---|---|---|
committer | drochner <drochner> | 2007-09-13 19:16:01 +0000 |
commit | f2c119a310cf83da5afd898e3e9be1f5860fd3ba (patch) | |
tree | 8cee033d941914021ef4a28fb02e2c9c627632ff /multimedia/mplayer | |
parent | 852445265eb1afe752c4a260972e9e7f75f00787 (diff) | |
download | pkgsrc-f2c119a310cf83da5afd898e3e9be1f5860fd3ba.tar.gz |
apply a security fix from upstream CVS:
Check wLongsPerEntry before using it.
This fixes a potential crash for some values of it.
As a side effect it works around broken callocs with an integer
overflow vulnerability, but using MPlayer on such systems should
never be assumed to be safe!
This should fix SA26806 (http://secunia.com/advisories/26806/).
bump PKGREVISIONs
Diffstat (limited to 'multimedia/mplayer')
-rw-r--r-- | multimedia/mplayer/Makefile | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/multimedia/mplayer/Makefile b/multimedia/mplayer/Makefile index 6abb5f40199..e7b29b803d6 100644 --- a/multimedia/mplayer/Makefile +++ b/multimedia/mplayer/Makefile @@ -1,7 +1,7 @@ -# $NetBSD: Makefile,v 1.45 2007/09/07 10:06:22 tron Exp $ +# $NetBSD: Makefile,v 1.46 2007/09/13 19:16:01 drochner Exp $ PKGNAME= mplayer-${MPLAYER_PKG_VERSION} -PKGREVISION= 8 +PKGREVISION= 9 COMMENT= Software-only MPEG-1/2/4 video decoder |