diff options
author | Thomas Deutschmann <whissi@gentoo.org> | 2017-06-17 21:55:00 +0200 |
---|---|---|
committer | Alexis Ballier <aballier@gentoo.org> | 2017-06-19 14:50:48 +0200 |
commit | 6a58da3acd14857965c3fe1030237fbb6c75bc91 (patch) | |
tree | e13b70702ec9dfec38554cd89d88ca1bded6ea40 /media-video/mplayer/files | |
parent | dev-perl/List-MoreUtils: Cleanup old re bug #613866 (diff) | |
download | gentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.tar.gz gentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.tar.bz2 gentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.zip |
media-video/mplayer: Rev bump to add patch for CVE-2016-4352 (bug #581952)
Package-Manager: Portage-2.3.5, Repoman-2.3.2
Diffstat (limited to 'media-video/mplayer/files')
-rw-r--r-- | media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch b/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch new file mode 100644 index 000000000000..4eabf8b5f28c --- /dev/null +++ b/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch @@ -0,0 +1,24 @@ +https://trac.mplayerhq.hu/ticket/2295 + +r37857 + +--- old/libmpdemux/demux_gif.c ++++ new/libmpdemux/demux_gif.c +@@ -304,6 +304,17 @@ + return NULL; + } + ++ // Validate image size, most code in this demuxer assumes w*h <= INT_MAX ++ if ((int64_t)gif->SWidth * gif->SHeight > INT_MAX) { ++ mp_msg(MSGT_DEMUX, MSGL_ERR, ++ "[demux_gif] Unsupported picture size %dx%d.\n", gif->SWidth, ++ gif->SHeight); ++ if (DGifCloseFile(gif) == GIF_ERROR) ++ print_gif_error(NULL); ++ free(priv); ++ return NULL; ++ } ++ + // create a new video stream header + sh_video = new_sh_video(demuxer, 0); + |