From b5856856126434a5f97941db8e40288bb85a6cb5 Mon Sep 17 00:00:00 2001 From: salo Date: Fri, 26 Sep 2003 12:04:46 +0000 Subject: PKGREVISION++ Fix remotely exploitable buffer overflow vulnerability. A malicious host can craft a harmful ASX header, and trick MPlayer into executing arbitrary code upon parsing that header. http://www.mplayerhq.hu/homepage/design6/news.html --- graphics/mplayer/distinfo | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'graphics/mplayer') diff --git a/graphics/mplayer/distinfo b/graphics/mplayer/distinfo index 55333815bd0..b173b9adf09 100644 --- a/graphics/mplayer/distinfo +++ b/graphics/mplayer/distinfo @@ -1,7 +1,8 @@ -$NetBSD: distinfo,v 1.37 2003/09/19 10:13:41 wiz Exp $ +$NetBSD: distinfo,v 1.38 2003/09/26 12:04:46 salo Exp $ SHA1 (mplayer/MPlayer-1.0pre1.tar.bz2) = 34482db6102a0d4b2a3692617926a92e44116f81 Size (mplayer/MPlayer-1.0pre1.tar.bz2) = 4190784 bytes SHA1 (patch-aa) = 6938dbdccb9b760dadad304f3bf61245e8b1baa6 +SHA1 (patch-ab) = a9765eaba21c68242bf106b6d679af851d6480fb SHA1 (patch-ad) = e77e938e7f4b9a2849f816bbc662db277d7898d3 SHA1 (patch-ae) = 12d16a7dda6be9d950d09d23d41d0de03ca70425 -- cgit v1.2.3