Author: diego Date: Thu May 27 23:39:48 2010 New Revision: 3505 Log: Move some old news entries to the archive.
Modified: trunk/design6/src/selector trunk/design6/src/upper trunk/src/news-archive.en trunk/src/news.en Modified: trunk/design6/src/selector ============================================================================== --- trunk/design6/src/selector Thu May 27 23:33:37 2010 (r3504) +++ trunk/design6/src/selector Thu May 27 23:39:48 2010 (r3505) @@ -635,7 +635,7 @@ <table class="text" cellpadding="0" cellspacing="0" border="0"> <tr> - <td width="100%" valign="top" align="left" background="images/b_01b.jpg"> + <td width="100%" valign="top" align="left" style="background=url(images/b_01b.jpg);"> <img src="images/b_01.jpg" width="324" height="114" border="0" alt=""><br> </td> <td width="21" valign="top" align="left"> @@ -644,7 +644,7 @@ </tr> <tr> - <td width="100%" valign="top" align="left" background="images/b_04b.jpg"> + <td width="100%" valign="top" align="left" style="background=url(images/b_04b.jpg);"> <img src="images/b_02.gif" width="21" height="21" border="0" alt=""><a href="news.html"><img src="images/b_03.jpg" width="174" height="21" border="0" alt="MPlayerhq.hu - The Movie Player For Linux"></a><img src="images/b_04.jpg" width="9" height="21" border="0" alt=""><br> </td> <td width="21" valign="top" align="left"> @@ -653,7 +653,7 @@ </tr> <tr> - <td width="100%" valign="top" align="left" background="images/b_05b.jpg"> + <td width="100%" valign="top" align="left" style="background=url(images/b_05b.jpg);"> <img src="images/b_05.jpg" width="207" height="29" border="0" alt=""><br> </td> <td width="21" valign="top" align="left"> @@ -662,7 +662,7 @@ </tr> <tr> - <td width="100%" valign="top" align="left" background="images/b_08b.jpg"> + <td width="100%" valign="top" align="left" style="background=url(images/b_08b.jpg);"> <img src="images/b_06.jpg" width="20" height="9" border="0" alt=""><img src="images/b_07.jpg" width="173" height="9" border="0" alt="the movie player for Linux - official site"><img src="images/b_08.jpg" width="9" height="9" border="0" alt=""><br> </td> <td width="21" valign="top" align="left"> @@ -680,7 +680,7 @@ </tr> <tr> - <td width="100%" valign="top" align="left" background="images/lg_bckg.jpg"> + <td width="100%" valign="top" align="left" style="background=url(images/lg_bckg.jpg);"> <img src="images/nothing.gif" width="1" height="2" border="0" alt=""><br> </td> <td width="21" valign="top" align="left"> @@ -689,7 +689,7 @@ </tr> <tr> - <td colspan="2" valign="top" align="left" background="images/b_11.jpg" class="front"> + <td colspan="2" valign="top" align="left" style="background=url(images/b_11.jpg);" class="front"> <!-- end selector --> Modified: trunk/design6/src/upper ============================================================================== --- trunk/design6/src/upper Thu May 27 23:33:37 2010 (r3504) +++ trunk/design6/src/upper Thu May 27 23:39:48 2010 (r3505) @@ -14,7 +14,7 @@ <table width="100%" cellpadding="0" cellspacing="0" border="0"> <tr> - <td width="205" valign="top" align="left" bgcolor="#303028" background="images/lg_bckg.jpg"> + <td class="aligned" width="205" bgcolor="#303028" style="background=url(images/lg_bckg.jpg);"> <img src="images/a_01.jpg" width="205" height="114" border="0" alt=""><br> <img src="images/a_02.jpg" width="205" height="21" border="0" alt=""><br> <img src="images/a_03.jpg" width="205" height="29" border="0" alt=""><br> @@ -24,7 +24,7 @@ <table width="201" cellpadding="0" cellspacing="0" border="0"> <tr> - <td width="201" valign="top" align="left" background="images/a_06.jpg" class="front"> + <td class="aligned" width="201" style="background=url(images/a_06.jpg);" class="front"> <table width="201" cellpadding="0" border="0"> Modified: trunk/src/news-archive.en ============================================================================== --- trunk/src/news-archive.en Thu May 27 23:33:37 2010 (r3504) +++ trunk/src/news-archive.en Thu May 27 23:39:48 2010 (r3505) @@ -9,6 +9,434 @@ <div class="newsentry"> <h2> + <a name="LinuxTag2008">2008-05-29, Thursday :: MPlayer at LinuxTag 2008</a> + <br><span class="poster">posted by Roberto</span> +</h2> + +<p class="left-inset"> +<a href="http://www.linuxtag.org/2008"> +<img src="../images/linuxtag.png" alt="LinuxTag2008" width="119" height="80"></a> +</p> + +<p> +Also this year MPlayer will be at +<a href="http://www.linuxtag.org/2008/en/home/welcome.html">LinuxTag</a>. +You can meet us at Messe Berlin in Hall 7 booth 113, from May 28 to 31. +</p> + +<p> +This year we're sharing the booth with <a href="http://ffmpeg.org/">FFmpeg</a> +and <a href="http://opengraphics.org">OGP</a>. +</p> + +<p> +Come visit us in Berlin! +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="gplv2">2008-04-30, Wednesday :: GPLv2</a> + <br><span class="poster">posted by Diego</span> +</h2> + +<p> +No, we do not have plans to switch to GPL version 3 at this particular +point in time. However, we do wish to be compatible with GPL version 3. +We also wish to have the option of switching licenses available in the +future. Circumstances making a license upgrade desirable might arise, +one never knows. Unfortunately there are some bits of code in +MPlayer, which are licensed as GPL version 2 only. Trying to get in +contact with the authors of these parts has been fruitless, we have +had no reaction from them. +</p> + +<p> +Thus we are looking for help contacting them. Specifically, we are +searching for the authors of +(<span style="text-decoration: line-through">crossed out</span> +authors we already found) +</p> + +<dl> +<dt><span style="text-decoration: line-through"><code>libmpcodecs/ve_x264.c</code></span></dt> +<dd>written by Bernhard Rosenkraenzer, last known email +addresses < bero at arklinux dot org > and +< bero at redhat dot com ></dd> +<dt><code>libmpdemux/demux_ty_osd.c</code></dt> +<dd>written by +<span style="text-decoration: line-through"> +Mike Baker, last known email address < mbm at linux dot com ></span> +and Christopher Wingert, last known +email addresses < cwingert at qualcomm dot com > +and < mailbox at wingert dot org > +and < usenet at wingert dot org > +and < tivo at wingert dot org ></dd> +<dt><span style="text-decoration: line-through"><code>TOOLS/realcodecs/*</code></span></dt> +<dd>written by Florian Schneider, last known email address +< flo-mplayer-dev at gmx dot net >. Note that this is not the Florian +Schneider from the band Kraftwerk, nor a researcher from the ETH Zürich.</dd> +</dl> + +<p> +If you know how to get in +touch with them or if you are one of the people we are seeking, please +<a href="mailto:webmaster_remove_the_underscores_and_the_text_in_betwe...@mplayerhq.hu">contact us</a> +so that we can get these issues resolved. Thanks a bunch. +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="dvdnav412">2008-04-15, Tuesday :: libdvdnav-4.1.2 released</a> + <br><span class="poster">posted by Dominik</span> +</h2> + +<p> +On the first anniversary of libdvdnav under the new dev team, we're happy +to announce a new release. But first, some history. +</p> + +<p> +As some of you probably know, libdvdnav hasn't been actively developed +upstream for quite some time. About a year ago, a couple of developers +related to MPlayer took over the task of maintaining libdvdnav. The first +release happened quietly on Sunday, October 28th 2007 and now it is time +for another. +</p> + +<p> +There have been many improvements to the build system and some bugfixes +including plugging a few memory leaks since the last release, but no major +changes. +</p> + +<p> +libdvdnav-4.1.2 can be downloaded from the following locations. Please be +kind to our server and use one of our many mirrors. +</p> + +<ul> + <li>Switzerland + <a href="http://www1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> + <a href="ftp://ftp1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>Hungary + <a href="http://www2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> + <a href="ftp://ftp2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>USA + <a href="http://www3.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a></li> + <li>USA + <a href="http://www4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> + <a href="ftp://ftp4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>Korea + <a href="http://www5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> + <a href="ftp://ftp5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>France + <a href="ftp://ftp6.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>Germany + <a href="http://www7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> + <a href="ftp://ftp7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> + <li>Germany + <a href="ftp://ftp.fu-berlin.de/unix/X11/multimedia/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> +</ul> + +<p> +SHA1SUM: <b>65e8f5aa01a60cf8fd013ef9e5d8c23b9fef21d6</b><br> +MD5SUM: <b>0e9a494403f9f5a2e781252c77599561</b> +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="vuln19">2008-01-30, Wednesday :: buffer overflow in stream_cddb.c</a> + <br><span class="poster">posted by Roberto</span> +</h2> + +<h3>Summary</h3> + +<p> +A buffer overflow was found and reported by Adam Bozanich of Musecurity in the +code used to extract album titles from CDDB server answers. +</p> + +<p> +When parsing answers from the CDDB server, the album title is copied into a +fixed-size buffer with insufficient size checks, which may cause a buffer +overflow. A malicious database entry could trigger a buffer overflow in the +program. That can lead to arbitrary code execution with the UID of the user +running MPlayer. +</p> + +<h3>Severity</h3> + +<p> +High (arbitrary code execution under the user ID running the player) when +getting disk information from a malicious CDDB entry, null if you do not use +this feature. Please note that it is possible to overwrite entries in the CDDB +database, so an attack can also be performed via a non-compromised server. At +the time the buffer overflow was fixed there was no known exploit in the wild. +</p> + +<h3>Solution</h3> + +<p> +A +<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=25820&r2=25824">fix</a> +for this problem was committed to SVN on Sun Jan 20 20:58:02 2008 UTC as r25824. +Users of affected MPlayer versions should download a +<a href="../MPlayer/patches/stream_cddb_fix_20080120.diff">patch</a> +for MPlayer 1.0rc2 or update to the latest version if they are using SVN. +</p> + +<h3>Affected versions</h3> + +<p> +MPlayer 1.0rc2 and SVN before r25824 (Sun Jan 20 20:58:02 2008 UTC). +Older versions are probably affected, but they were not checked. +</p> + + +<h3>Unaffected versions</h3> + +<p> +SVN HEAD after r25824 (Sun Jan 20 20:58:02 2008 UTC)<br> +MPlayer 1.0rc2 + security patches +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="vuln18">2008-01-30, Wednesday :: buffer overflow in url.c</a> + <br><span class="poster">posted by Roberto</span> +</h2> + +<h3>Summary</h3> + +<p> +A buffer overflow was found and reported by Adam Bozanich of Musecurity in the +code used to escape URL strings. +</p> + +<p> +The code used to skip over IPv6 addresses can be tricked into leaving a pointer +to a temporary buffer with a non-NULL value; this causes the unescape code to +reuse the buffer, and may lead to a buffer overflow if the old buffer is +smaller than required. A malicious URL string may be used to trigger a buffer +overflow in the program, that can lead to arbitrary code execution with the +UID of the user running MPlayer. +</p> + +<h3>Severity</h3> + +<p> +High (arbitrary code execution under the user ID running the player) if you can +play untrusted URLs (e.g. delivered by a remote playlist), null if you do not +use this feature. At the time the buffer overflow was fixed there was no known +exploit in the wild. +</p> + +<h3>Solution</h3> + +<p> +A +<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/url.c?r1=25648&r2=25823">fix</a> +for this problem was committed to SVN on Sun Jan 20 20:43:46 2008 UTC as r25823. +Users of affected MPlayer versions should download a +<a href="../MPlayer/patches/url_fix_20080120.diff">patch</a> +for MPlayer 1.0rc2 or update to the latest version if they are using SVN. +</p> + +<h3>Affected versions</h3> + +<p> +MPlayer 1.0rc2 and SVN before r25823 (Sun Jan 20 20:43:46 2008 UTC). +Older versions are probably affected, but they were not checked. +</p> + + +<h3>Unaffected versions</h3> + +<p> +SVN HEAD after r25823 (Sun Jan 20 20:43:46 2008 UTC)<br> +MPlayer 1.0rc2 + security patches +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="vuln17">2008-01-29, Tuesday :: buffer overflow in demux_mov.c</a> + <br><span class="poster">posted by Roberto</span> +</h2> + +<h3>Summary</h3> + +<p> +A buffer overflow was found and reported by Felipe Manzano and Anibal Sacco of +CORE Security Technologies in the code used to parse MOV file headers. +Other similar issues were found by Reimar Döffinger while fixing the code. +The vulnerability is identified as CORE-2008-0122. +</p> + +<p> +The code read some values from the file and used them as indexes into an array +allocated on the heap without performing any boundary check. A malicious file +may be used to trigger a buffer overflow in the program. That can lead to +arbitrary code execution with the UID of the user running MPlayer. +</p> + +<h3>Severity</h3> + +<p> +High (arbitrary code execution under the user ID running the player) when +playing a malicious MOV file, null if you do not use this feature. At the time +the buffer overflow was fixed there was no known exploit in the wild. +</p> + +<h3>Solution</h3> + +<p> +A +<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_mov.c?r1=25920&r2=25922">fix</a> +for this problem was committed to SVN on Tue Jan 29 22:13:20 2008 UTC as r25920, +Tue Jan 29 22:13:47 2008 UTC as r25921 and Tue Jan 29 22:14:00 2008 UTC as +r25922. +Users of affected MPlayer versions should download a +<a href="../MPlayer/patches/demux_mov_fix_20080129.diff">patch</a> +for MPlayer 1.0rc2 or update to the latest version if they are using SVN. +</p> + +<h3>Affected versions</h3> + +<p> +MPlayer 1.0rc2 and SVN before r25922 (Tue Jan 29 22:14:00 2008 UTC). +Older versions are probably affected, but they were not checked. +</p> + + +<h3>Unaffected versions</h3> + +<p> +SVN HEAD after r25922 (Tue Jan 29 22:14:00 2008 UTC)<br> +MPlayer 1.0rc2 + security patches +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="vuln16">2008-01-29, Tuesday :: stack overflow in demux_audio.c</a> + <br><span class="poster">posted by Roberto</span> +</h2> + +<h3>Summary</h3> + +<p> +A stack overflow was found and reported by Damian Frizza and Alfredo Ortega of +CORE Security Technologies in the code used to parse FLAC comments. The +vulnerability is identified as CORE-2008-1218. +</p> + +<p> +When loading a comment from the file, a length value is read from the file and +then used as an index to a VLA array with no check performed. A malicious file +could trigger a stack overflow in the program, leading to arbitrary code +execution with the UID of the user running MPlayer. +</p> + +<h3>Severity</h3> + +<p> +High (arbitrary code execution under the user ID running the player) when +playing a FLAC file with malicious comments, null if you do not use this +feature. At the time the buffer overflow was fixed there was no known exploit +in the wild. +</p> + +<h3>Solution</h3> + +<p> +A +<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_audio.c?r1=25911&r2=25917">fix</a> +for this problem was committed to SVN on Tue Jan 29 22:00:58 2008 UTC as r25917. +Users of affected MPlayer versions should download a +<a href="../MPlayer/patches/demux_audio_fix_20080129.diff">patch</a> +for MPlayer 1.0rc2 or update to the latest version if they are using SVN. +</p> + +<h3>Affected versions</h3> + +<p> +MPlayer 1.0rc2 and SVN before r25917 (Tue Jan 29 22:00:58 2008 UTC). +Older versions are probably affected, but they were not checked. +</p> + + +<h3>Unaffected versions</h3> + +<p> +SVN HEAD after r25917 (Tue Jan 29 22:00:58 2008 UTC)<br> +MPlayer 1.0rc2 + security patches +</p> + +</div> + + + +<div class="newsentry"> + +<h2> + <a name="HUPAward2007">2008-01-03, Wednesday :: HUP Readers' Choice Award 2007</a> + <br><span class="poster">posted by Diego</span> +</h2> + +<p class="left-inset"> +<a href="http://hup.hu/node/33504"> +<img src="../images/awards/hup2007.png" alt="HUP Readers' Choice Award 2007" width="120" height="120"></a> +</p> + +<p> +Like every year the <a href="http://hup.hu">Hungarian Unix Portal</a> has +held its annual Readers' Choice Award and MPlayer + its frontends came out +on top of the "favorite video player" category. +MPlayer got 600 votes (61%), placing it before VLC with 231 (23%) and +Totem with 49 (5%). +</p> + +<p> +If you can read Hungarian, check out the +<a href="http://hup.hu/node/48704">HUP award page</a>. +</p> + +</div> + + + +<div class="newsentry"> + +<h2> <a name="mplayer10rc2">2007-10-07, Sunday :: MPlayer 1.0rc2 released</a> <br><span class="poster">posted by the release team</span> </h2> Modified: trunk/src/news.en ============================================================================== --- trunk/src/news.en Thu May 27 23:33:37 2010 (r3504) +++ trunk/src/news.en Thu May 27 23:39:48 2010 (r3505) @@ -556,433 +556,4 @@ </div> -<div class="newsentry"> - -<h2> - <a name="LinuxTag2008">2008-05-29, Thursday :: MPlayer at LinuxTag 2008</a> - <br><span class="poster">posted by Roberto</span> -</h2> - -<p class="left-inset"> -<a href="http://www.linuxtag.org/2008"> -<img src="../images/linuxtag.png" alt="LinuxTag2008" width="119" height="80"></a> -</p> - -<p> -Also this year MPlayer will be at -<a href="http://www.linuxtag.org/2008/en/home/welcome.html">LinuxTag</a>. -You can meet us at Messe Berlin in Hall 7 booth 113, from May 28 to 31. -</p> - -<p> -This year we're sharing the booth with <a href="http://ffmpeg.org/">FFmpeg</a> -and <a href="http://opengraphics.org">OGP</a>. -</p> - -<p> -Come visit us in Berlin! -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="gplv2">2008-04-30, Wednesday :: GPLv2</a> - <br><span class="poster">posted by Diego</span> -</h2> - -<p> -No, we do not have plans to switch to GPL version 3 at this particular -point in time. However, we do wish to be compatible with GPL version 3. -We also wish to have the option of switching licenses available in the -future. Circumstances making a license upgrade desirable might arise, -one never knows. Unfortunately there are some bits of code in -MPlayer, which are licensed as GPL version 2 only. Trying to get in -contact with the authors of these parts has been fruitless, we have -had no reaction from them. -</p> - -<p> -Thus we are looking for help contacting them. Specifically, we are -searching for the authors of -(<span style="text-decoration: line-through">crossed out</span> -authors we already found) -</p> - -<dl> -<dt><span style="text-decoration: line-through"><code>libmpcodecs/ve_x264.c</code></span></dt> -<dd>written by Bernhard Rosenkraenzer, last known email -addresses < bero at arklinux dot org > and -< bero at redhat dot com ></dd> -<dt><code>libmpdemux/demux_ty_osd.c</code></dt> -<dd>written by -<span style="text-decoration: line-through"> -Mike Baker, last known email address < mbm at linux dot com ></span> -and Christopher Wingert, last known -email addresses < cwingert at qualcomm dot com > -and < mailbox at wingert dot org > -and < usenet at wingert dot org > -and < tivo at wingert dot org ></dd> -<dt><span style="text-decoration: line-through"><code>TOOLS/realcodecs/*</code></span></dt> -<dd>written by Florian Schneider, last known email address -< flo-mplayer-dev at gmx dot net >. Note that this is not the Florian -Schneider from the band Kraftwerk, nor a researcher from the ETH Zürich.</dd> -</dl> - -<p> -If you know how to get in -touch with them or if you are one of the people we are seeking, please -<a href="mailto:webmaster_remove_the_underscores_and_the_text_in_betwe...@mplayerhq.hu">contact us</a> -so that we can get these issues resolved. Thanks a bunch. -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="dvdnav412">2008-04-15, Tuesday :: libdvdnav-4.1.2 released</a> - <br><span class="poster">posted by Dominik</span> -</h2> - -<p> -On the first anniversary of libdvdnav under the new dev team, we're happy -to announce a new release. But first, some history. -</p> - -<p> -As some of you probably know, libdvdnav hasn't been actively developed -upstream for quite some time. About a year ago, a couple of developers -related to MPlayer took over the task of maintaining libdvdnav. The first -release happened quietly on Sunday, October 28th 2007 and now it is time -for another. -</p> - -<p> -There have been many improvements to the build system and some bugfixes -including plugging a few memory leaks since the last release, but no major -changes. -</p> - -<p> -libdvdnav-4.1.2 can be downloaded from the following locations. Please be -kind to our server and use one of our many mirrors. -</p> - -<ul> - <li>Switzerland - <a href="http://www1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> - <a href="ftp://ftp1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>Hungary - <a href="http://www2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> - <a href="ftp://ftp2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>USA - <a href="http://www3.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a></li> - <li>USA - <a href="http://www4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> - <a href="ftp://ftp4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>Korea - <a href="http://www5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> - <a href="ftp://ftp5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>France - <a href="ftp://ftp6.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>Germany - <a href="http://www7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a> - <a href="ftp://ftp7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> - <li>Germany - <a href="ftp://ftp.fu-berlin.de/unix/X11/multimedia/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li> -</ul> - -<p> -SHA1SUM: <b>65e8f5aa01a60cf8fd013ef9e5d8c23b9fef21d6</b><br> -MD5SUM: <b>0e9a494403f9f5a2e781252c77599561</b> -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="vuln19">2008-01-30, Wednesday :: buffer overflow in stream_cddb.c</a> - <br><span class="poster">posted by Roberto</span> -</h2> - -<h3>Summary</h3> - -<p> -A buffer overflow was found and reported by Adam Bozanich of Musecurity in the -code used to extract album titles from CDDB server answers. -</p> - -<p> -When parsing answers from the CDDB server, the album title is copied into a -fixed-size buffer with insufficient size checks, which may cause a buffer -overflow. A malicious database entry could trigger a buffer overflow in the -program. That can lead to arbitrary code execution with the UID of the user -running MPlayer. -</p> - -<h3>Severity</h3> - -<p> -High (arbitrary code execution under the user ID running the player) when -getting disk information from a malicious CDDB entry, null if you do not use -this feature. Please note that it is possible to overwrite entries in the CDDB -database, so an attack can also be performed via a non-compromised server. At -the time the buffer overflow was fixed there was no known exploit in the wild. -</p> - -<h3>Solution</h3> - -<p> -A -<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=25820&r2=25824">fix</a> -for this problem was committed to SVN on Sun Jan 20 20:58:02 2008 UTC as r25824. -Users of affected MPlayer versions should download a -<a href="../MPlayer/patches/stream_cddb_fix_20080120.diff">patch</a> -for MPlayer 1.0rc2 or update to the latest version if they are using SVN. -</p> - -<h3>Affected versions</h3> - -<p> -MPlayer 1.0rc2 and SVN before r25824 (Sun Jan 20 20:58:02 2008 UTC). -Older versions are probably affected, but they were not checked. -</p> - - -<h3>Unaffected versions</h3> - -<p> -SVN HEAD after r25824 (Sun Jan 20 20:58:02 2008 UTC)<br> -MPlayer 1.0rc2 + security patches -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="vuln18">2008-01-30, Wednesday :: buffer overflow in url.c</a> - <br><span class="poster">posted by Roberto</span> -</h2> - -<h3>Summary</h3> - -<p> -A buffer overflow was found and reported by Adam Bozanich of Musecurity in the -code used to escape URL strings. -</p> - -<p> -The code used to skip over IPv6 addresses can be tricked into leaving a pointer -to a temporary buffer with a non-NULL value; this causes the unescape code to -reuse the buffer, and may lead to a buffer overflow if the old buffer is -smaller than required. A malicious URL string may be used to trigger a buffer -overflow in the program, that can lead to arbitrary code execution with the -UID of the user running MPlayer. -</p> - -<h3>Severity</h3> - -<p> -High (arbitrary code execution under the user ID running the player) if you can -play untrusted URLs (e.g. delivered by a remote playlist), null if you do not -use this feature. At the time the buffer overflow was fixed there was no known -exploit in the wild. -</p> - -<h3>Solution</h3> - -<p> -A -<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/url.c?r1=25648&r2=25823">fix</a> -for this problem was committed to SVN on Sun Jan 20 20:43:46 2008 UTC as r25823. -Users of affected MPlayer versions should download a -<a href="../MPlayer/patches/url_fix_20080120.diff">patch</a> -for MPlayer 1.0rc2 or update to the latest version if they are using SVN. -</p> - -<h3>Affected versions</h3> - -<p> -MPlayer 1.0rc2 and SVN before r25823 (Sun Jan 20 20:43:46 2008 UTC). -Older versions are probably affected, but they were not checked. -</p> - - -<h3>Unaffected versions</h3> - -<p> -SVN HEAD after r25823 (Sun Jan 20 20:43:46 2008 UTC)<br> -MPlayer 1.0rc2 + security patches -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="vuln17">2008-01-29, Tuesday :: buffer overflow in demux_mov.c</a> - <br><span class="poster">posted by Roberto</span> -</h2> - -<h3>Summary</h3> - -<p> -A buffer overflow was found and reported by Felipe Manzano and Anibal Sacco of -CORE Security Technologies in the code used to parse MOV file headers. -Other similar issues were found by Reimar Döffinger while fixing the code. -The vulnerability is identified as CORE-2008-0122. -</p> - -<p> -The code read some values from the file and used them as indexes into an array -allocated on the heap without performing any boundary check. A malicious file -may be used to trigger a buffer overflow in the program. That can lead to -arbitrary code execution with the UID of the user running MPlayer. -</p> - -<h3>Severity</h3> - -<p> -High (arbitrary code execution under the user ID running the player) when -playing a malicious MOV file, null if you do not use this feature. At the time -the buffer overflow was fixed there was no known exploit in the wild. -</p> - -<h3>Solution</h3> - -<p> -A -<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_mov.c?r1=25920&r2=25922">fix</a> -for this problem was committed to SVN on Tue Jan 29 22:13:20 2008 UTC as r25920, -Tue Jan 29 22:13:47 2008 UTC as r25921 and Tue Jan 29 22:14:00 2008 UTC as -r25922. -Users of affected MPlayer versions should download a -<a href="../MPlayer/patches/demux_mov_fix_20080129.diff">patch</a> -for MPlayer 1.0rc2 or update to the latest version if they are using SVN. -</p> - -<h3>Affected versions</h3> - -<p> -MPlayer 1.0rc2 and SVN before r25922 (Tue Jan 29 22:14:00 2008 UTC). -Older versions are probably affected, but they were not checked. -</p> - - -<h3>Unaffected versions</h3> - -<p> -SVN HEAD after r25922 (Tue Jan 29 22:14:00 2008 UTC)<br> -MPlayer 1.0rc2 + security patches -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="vuln16">2008-01-29, Tuesday :: stack overflow in demux_audio.c</a> - <br><span class="poster">posted by Roberto</span> -</h2> - -<h3>Summary</h3> - -<p> -A stack overflow was found and reported by Damian Frizza and Alfredo Ortega of -CORE Security Technologies in the code used to parse FLAC comments. The -vulnerability is identified as CORE-2008-1218. -</p> - -<p> -When loading a comment from the file, a length value is read from the file and -then used as an index to a VLA array with no check performed. A malicious file -could trigger a stack overflow in the program, leading to arbitrary code -execution with the UID of the user running MPlayer. -</p> - -<h3>Severity</h3> - -<p> -High (arbitrary code execution under the user ID running the player) when -playing a FLAC file with malicious comments, null if you do not use this -feature. At the time the buffer overflow was fixed there was no known exploit -in the wild. -</p> - -<h3>Solution</h3> - -<p> -A -<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_audio.c?r1=25911&r2=25917">fix</a> -for this problem was committed to SVN on Tue Jan 29 22:00:58 2008 UTC as r25917. -Users of affected MPlayer versions should download a -<a href="../MPlayer/patches/demux_audio_fix_20080129.diff">patch</a> -for MPlayer 1.0rc2 or update to the latest version if they are using SVN. -</p> - -<h3>Affected versions</h3> - -<p> -MPlayer 1.0rc2 and SVN before r25917 (Tue Jan 29 22:00:58 2008 UTC). -Older versions are probably affected, but they were not checked. -</p> - - -<h3>Unaffected versions</h3> - -<p> -SVN HEAD after r25917 (Tue Jan 29 22:00:58 2008 UTC)<br> -MPlayer 1.0rc2 + security patches -</p> - -</div> - - - -<div class="newsentry"> - -<h2> - <a name="HUPAward2007">2008-01-03, Wednesday :: HUP Readers' Choice Award 2007</a> - <br><span class="poster">posted by Diego</span> -</h2> - -<p class="left-inset"> -<a href="http://hup.hu/node/33504"> -<img src="../images/awards/hup2007.png" alt="HUP Readers' Choice Award 2007" width="120" height="120"></a> -</p> - -<p> -Like every year the <a href="http://hup.hu">Hungarian Unix Portal</a> has -held its annual Readers' Choice Award and MPlayer + its frontends came out -on top of the "favorite video player" category. -MPlayer got 600 votes (61%), placing it before VLC with 231 (23%) and -Totem with 49 (5%). -</p> - -<p> -If you can read Hungarian, check out the -<a href="http://hup.hu/node/48704">HUP award page</a>. -</p> - -</div> - -<br> - - <!-- content end --> _______________________________________________ MPlayer-DOCS mailing list MPlayer-DOCS@mplayerhq.hu https://lists.mplayerhq.hu/mailman/listinfo/mplayer-docs