openbsd-ports/multimedia/xine-lib/patches/patch-src_demuxers_demux_asf_c
jakemsr c83e455e07 maintenence update to 1.1.10
SECURITY- fixx buffer overflow which allows a remote attacker to
execute arbitrary code or crash the client program via a crafted ASF
header

from brad, thanks
2008-01-30 03:52:32 +00:00

13 lines
624 B
Plaintext

$OpenBSD: patch-src_demuxers_demux_asf_c,v 1.3 2008/01/30 03:52:32 jakemsr Exp $
--- src/demuxers/demux_asf.c.orig Wed Jan 23 12:52:33 2008
+++ src/demuxers/demux_asf.c Tue Jan 29 11:48:36 2008
@@ -440,7 +440,7 @@ static int asf_read_header (demux_asf_t *this) {
xine_log(this->stream->xine, XINE_LOG_MSG,
_("demux_asf: warning: The stream id=%d is encrypted.\n"), asf_stream->stream_number);
_x_message(this->stream, XINE_MSG_ENCRYPTED_SOURCE,
- _("Media stream scrambled/encrypted"), NULL);
+ _("Media stream scrambled/encrypted"), (char *)NULL);
this->mode = ASF_MODE_ENCRYPTED_CONTENT;
}
}