diff options
author | tron <tron@pkgsrc.org> | 2005-04-26 12:48:34 +0000 |
---|---|---|
committer | tron <tron@pkgsrc.org> | 2005-04-26 12:48:34 +0000 |
commit | a62e3406ed621a2ebe11e42e4c17b0d4f67719f7 (patch) | |
tree | e771ce5d72f05b5d0db4de774ca30b92043b87b3 /multimedia/xine-lib/patches | |
parent | 9c608da385290318aee7acb4272cf0966920dc1b (diff) | |
download | pkgsrc-a62e3406ed621a2ebe11e42e4c17b0d4f67719f7.tar.gz |
Add patches to fix security vulnerability reported in XSA-2004-8.
Bump package revision because of this change.
Diffstat (limited to 'multimedia/xine-lib/patches')
-rw-r--r-- | multimedia/xine-lib/patches/patch-aj | 21 | ||||
-rw-r--r-- | multimedia/xine-lib/patches/patch-ak | 21 |
2 files changed, 42 insertions, 0 deletions
diff --git a/multimedia/xine-lib/patches/patch-aj b/multimedia/xine-lib/patches/patch-aj new file mode 100644 index 00000000000..62b62d561f5 --- /dev/null +++ b/multimedia/xine-lib/patches/patch-aj @@ -0,0 +1,21 @@ +$NetBSD: patch-aj,v 1.5 2005/04/26 12:48:35 tron Exp $ + +--- src/input/mms.c 2005/01/18 23:25:34 1.55 ++++ src/input/mms.c 2005/04/21 19:02:43 1.56 +@@ -583,9 +583,13 @@ + lprintf ("stream object, stream id: %d, type: %d, encrypted: %d\n", + stream_id, type, encrypted); + +- this->stream_types[stream_id] = type; +- this->stream_ids[this->num_stream_ids] = stream_id; +- this->num_stream_ids++; ++ if (this->num_stream_ids < ASF_MAX_NUM_STREAMS && stream_id < ASF_MAX_NUM_STREAMS) { ++ this->stream_types[stream_id] = type; ++ this->stream_ids[this->num_stream_ids] = stream_id; ++ this->num_stream_ids++; ++ } else { ++ lprintf ("too many streams, skipping\n"); ++ } + + } + break; diff --git a/multimedia/xine-lib/patches/patch-ak b/multimedia/xine-lib/patches/patch-ak new file mode 100644 index 00000000000..b5d02e71fae --- /dev/null +++ b/multimedia/xine-lib/patches/patch-ak @@ -0,0 +1,21 @@ +$NetBSD: patch-ak,v 1.3 2005/04/26 12:48:35 tron Exp $ + +--- src/input/librtsp/rtsp.c 2004/07/25 17:13:54 1.18 ++++ src/input/librtsp/rtsp.c 2005/04/16 07:10:51 1.19 +@@ -218,6 +218,7 @@ + unsigned int answer_seq; + char **answer_ptr=s->answers; + int code; ++ int ans_count = 0; + + answer=rtsp_get(s); + if (!answer) +@@ -268,7 +269,7 @@ + } + *answer_ptr=answer; + answer_ptr++; +- } while (strlen(answer)!=0); ++ } while ((strlen(answer)!=0) && (++ans_count < MAX_FIELDS)); + + s->cseq++; + |