summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Deutschmann <whissi@gentoo.org>2017-06-17 21:55:00 +0200
committerAlexis Ballier <aballier@gentoo.org>2017-06-19 14:50:48 +0200
commit6a58da3acd14857965c3fe1030237fbb6c75bc91 (patch)
treee13b70702ec9dfec38554cd89d88ca1bded6ea40 /media-video/mplayer/files
parentdev-perl/List-MoreUtils: Cleanup old re bug #613866 (diff)
downloadgentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.tar.gz
gentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.tar.bz2
gentoo-6a58da3acd14857965c3fe1030237fbb6c75bc91.zip
media-video/mplayer: Rev bump to add patch for CVE-2016-4352 (bug #581952)
Package-Manager: Portage-2.3.5, Repoman-2.3.2
Diffstat (limited to 'media-video/mplayer/files')
-rw-r--r--media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch24
1 files changed, 24 insertions, 0 deletions
diff --git a/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch b/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch
new file mode 100644
index 000000000000..4eabf8b5f28c
--- /dev/null
+++ b/media-video/mplayer/files/mplayer-1.3-CVE-2016-4352.patch
@@ -0,0 +1,24 @@
+https://trac.mplayerhq.hu/ticket/2295
+
+r37857
+
+--- old/libmpdemux/demux_gif.c
++++ new/libmpdemux/demux_gif.c
+@@ -304,6 +304,17 @@
+ return NULL;
+ }
+
++ // Validate image size, most code in this demuxer assumes w*h <= INT_MAX
++ if ((int64_t)gif->SWidth * gif->SHeight > INT_MAX) {
++ mp_msg(MSGT_DEMUX, MSGL_ERR,
++ "[demux_gif] Unsupported picture size %dx%d.\n", gif->SWidth,
++ gif->SHeight);
++ if (DGifCloseFile(gif) == GIF_ERROR)
++ print_gif_error(NULL);
++ free(priv);
++ return NULL;
++ }
++
+ // create a new video stream header
+ sh_video = new_sh_video(demuxer, 0);
+