pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/multimedia/xvidcore Update to 1.1.3:
details: https://anonhg.NetBSD.org/pkgsrc/rev/01041bb4f1d4
branches: trunk
changeset: 530673:01041bb4f1d4
user: wiz <wiz%pkgsrc.org@localhost>
date: Tue Jul 03 19:53:00 2007 +0000
description:
Update to 1.1.3:
Changes since 1.1.2:
xvidcore library
* Fixed a potential vulnerability in mbcoding.c reported by Trixter Jack
at Secunia
(was already in patch-ac)
diffstat:
multimedia/xvidcore/Makefile | 5 +--
multimedia/xvidcore/distinfo | 9 +++---
multimedia/xvidcore/patches/patch-ac | 48 ------------------------------------
3 files changed, 6 insertions(+), 56 deletions(-)
diffs (81 lines):
diff -r a6e0484fbdd2 -r 01041bb4f1d4 multimedia/xvidcore/Makefile
--- a/multimedia/xvidcore/Makefile Tue Jul 03 19:48:14 2007 +0000
+++ b/multimedia/xvidcore/Makefile Tue Jul 03 19:53:00 2007 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.28 2007/06/26 11:45:16 lkundrak Exp $
+# $NetBSD: Makefile,v 1.29 2007/07/03 19:53:00 wiz Exp $
-DISTNAME= xvidcore-1.1.2
-PKGREVISION= 1
+DISTNAME= xvidcore-1.1.3
CATEGORIES= multimedia
MASTER_SITES= http://downloads.xvid.org/downloads/
EXTRACT_SUFX= .tar.bz2
diff -r a6e0484fbdd2 -r 01041bb4f1d4 multimedia/xvidcore/distinfo
--- a/multimedia/xvidcore/distinfo Tue Jul 03 19:48:14 2007 +0000
+++ b/multimedia/xvidcore/distinfo Tue Jul 03 19:53:00 2007 +0000
@@ -1,8 +1,7 @@
-$NetBSD: distinfo,v 1.17 2007/06/26 15:31:34 tron Exp $
+$NetBSD: distinfo,v 1.18 2007/07/03 19:53:00 wiz Exp $
-SHA1 (xvidcore-1.1.2.tar.bz2) = a524c18f34133dc83b7be90abda7d0ae4ab3b7fb
-RMD160 (xvidcore-1.1.2.tar.bz2) = bc3dfbd176ece5f54bbd72f1e655eba4da9baeb4
-Size (xvidcore-1.1.2.tar.bz2) = 626741 bytes
+SHA1 (xvidcore-1.1.3.tar.bz2) = 7a945c245851e115bc107aa621f72d775a5d1adb
+RMD160 (xvidcore-1.1.3.tar.bz2) = f890a2ef58be5362aa1d2894e748ef11a0c7bba8
+Size (xvidcore-1.1.3.tar.bz2) = 625974 bytes
SHA1 (patch-aa) = 593ae63ddb5ec646d7f531b99783de64a9d6ceb3
SHA1 (patch-ab) = 19306e1db22eeb58e703b1b416b019c0d2c4a694
-SHA1 (patch-ac) = 14a89ffb15c5817ad1958d7e5246abdd33e3727c
diff -r a6e0484fbdd2 -r 01041bb4f1d4 multimedia/xvidcore/patches/patch-ac
--- a/multimedia/xvidcore/patches/patch-ac Tue Jul 03 19:48:14 2007 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-$NetBSD: patch-ac,v 1.2 2007/06/26 15:31:34 tron Exp $
-
-This is believed to fix CVE-2007-3329.
-Though there is no more information about the vulnerability apart from function names,
-it seems that coeff is the only index that could point out of bounds causing harm
-and only these three functions share this code.
-
---- ../../src/bitstream/mbcoding.c.orig 2007-06-26 13:38:17.000000000 +0200
-+++ ../../src/bitstream/mbcoding.c
-@@ -1073,12 +1073,10 @@ get_intra_block(Bitstream * bs,
- }
- coeff += run;
-
--#ifdef _DEBUG
- if(coeff>=64) {
- DPRINTF(XVID_DEBUG_ERROR,"error: overflow in coefficient index\n");
- return;
- }
--#endif
-
- block[scan[coeff]] = level;
-
-@@ -1121,12 +1119,10 @@ get_inter_block_h263(
- }
- p += run;
-
--#ifdef _DEBUG
- if(p>=64) {
- DPRINTF(XVID_DEBUG_ERROR,"error: overflow in coefficient index\n");
- return;
- }
--#endif
-
- if (level < 0) {
- level = level*quant_m_2 - quant_add;
-@@ -1163,12 +1159,10 @@ get_inter_block_mpeg(
- }
- p += run;
-
--#ifdef _DEBUG
- if(p>=64) {
- DPRINTF(XVID_DEBUG_ERROR,"error: overflow in coefficient index\n");
- return;
- }
--#endif
-
- if (level < 0) {
- level = ((2 * -level + 1) * matrix[scan[p]] * quant) >> 4;
Home |
Main Index |
Thread Index |
Old Index