openbsd-ports/x11/mplayer/pkg/PLIST
sturm d0e57c8908 SECURITY UPDATE to 0.92
fixes a remotely exploitable buffer overflow in ASX headers that could
be used to make mplayer run arbitrary code

from maintainer Bjoern Sandell
2003-09-25 20:59:01 +00:00

35 lines
1.1 KiB
Plaintext

@comment $OpenBSD: PLIST,v 1.8 2003/09/25 20:59:01 sturm Exp $
@exec echo "This package may need further setup. Run pkg_info mplayer to find out more,"
@exec echo "and be sure to read the package description carefully."
bin/mencoder
bin/mplayer
lib/mplayer/vidix/cyberblade_vid.so
lib/mplayer/vidix/mach64_vid.so
lib/mplayer/vidix/mga_crtc2_vid.so
lib/mplayer/vidix/mga_vid.so
lib/mplayer/vidix/pm3_vid.so
lib/mplayer/vidix/radeon_vid.so
lib/mplayer/vidix/rage128_vid.so
%%SHARED%%
man/man1/mencoder.1
man/man1/mplayer.1
share/mplayer/input.conf
share/mplayer/menu.conf
share/doc/mplayer/bugreports.html
share/doc/mplayer/cd-dvd.html
share/doc/mplayer/codecs-in.html
share/doc/mplayer/codecs.html
share/doc/mplayer/documentation.html
share/doc/mplayer/encoding.html
share/doc/mplayer/faq.html
share/doc/mplayer/formats.html
share/doc/mplayer/skin.html
share/doc/mplayer/sound.html
share/doc/mplayer/users_against_developers.html
share/doc/mplayer/video.html
!%%no_x11%%
@unexec rmdir %D/share/mplayer 2>/dev/null || true
@dirrm share/doc/mplayer
@dirrm lib/mplayer/vidix
@dirrm lib/mplayer