[MPlayer-DOCS] CVS: homepage/src news.src.en,1.157,1.158
Torinthiel CVS
syncmail at mplayerhq.hu
Mon Nov 1 19:15:39 CET 2004
- Previous message: [MPlayer-DOCS] CVS: main/DOCS/xml configure,1.14,1.15
- Next message: [MPlayer-DOCS] CVS: homepage/src dload.src.pl, NONE, 1.1 donations.src.pl, NONE, 1.1 info.src.pl, NONE, 1.1 news.src.pl, NONE, 1.1 screen.src.pl, NONE, 1.1
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
CVS change done by Torinthiel CVS
Update of /cvsroot/mplayer/homepage/src
In directory mail:/var2/tmp/cvs-serv16104
Modified Files:
news.src.en
Log Message:
s/tab/space/
Index: news.src.en
===================================================================
RCS file: /cvsroot/mplayer/homepage/src/news.src.en,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -r1.157 -r1.158
--- news.src.en 30 Oct 2004 17:33:16 -0000 1.157
+++ news.src.en 1 Nov 2004 18:15:37 -0000 1.158
@@ -615,7 +615,7 @@
Multiple vulnerabilities have been found and fixed in the Real-Time
Streaming Protocol (RTSP) client for RealNetworks servers, including a
series of potentially remotely exploitable buffer overflows. This is a
-joint advisory by the MPlayer and xine teams as the code in question is
+joint advisory by the MPlayer and xine teams as the code in question is
common to these projects. The xine team has assigned ID XSA-2004-3 to this
security announcement.
</p>
@@ -689,7 +689,7 @@
<ol>
<li>Fixed length buffers were assigned for the URL used in server requests
- and the length of the input was never checked. Very long URLs could thus
+ and the length of the input was never checked. Very long URLs could thus
overflow these buffers and crash the application. A malicious person
might possibly use a specially crafted URL or playlist to run arbitrary
code on the user's machine.</li>
@@ -703,13 +703,13 @@
<li>On Wed, 14 Apr 2004 22:45:28 +0200 (CEST) a change was made to MPlayer
CVS that removes the extension checking on RTSP streams. MPlayer now
attempts to handle every RTSP connection as realrtsp first, falling back
- to live.com RTSP. CVS versions from that date to the time the fix was
+ to live.com RTSP. CVS versions from that date to the time the fix was
checked in are susceptible to the same problem when playing normal RTSP
streams as well.</li>
<li>At the time of the writing of this advisory no real exploits are known
to the authors and we hope to be the first to stumble across this
vulnerability. Since we believe that the bugs described in this advisory
- are exploitable we have released this proactive advisory.</li>
+ are exploitable we have released this proactive advisory.</li>
</ol>
<h3>Download:</h3>
@@ -1454,7 +1454,7 @@
</center>
<p>
-MPlayer received 44.61% of the votes, beating
+MPlayer received 44.61% of the votes, beating
<a href="http://www.xmms.org">XMMS</a> with 27.90% and
<a href="http://www.xinehq.de">xine</a> with 17.40%.
</p>
@@ -1773,7 +1773,7 @@
<ol>
<li><a href="mailto:peter.wilmar.christensen at kiss-technology.com">Mr. Christensen</a>
- never took the time to read our announcements.</li>
+ never took the time to read our announcements.</li>
<li><a href="mailto:peter.wilmar.christensen at kiss-technology.com">Mr. Christensen</a>
suggest they've implemented our subtitle format <i>way before we did it
ourselves</i>. The KiSS firmwares are all made in 2003, which is - as far
- Previous message: [MPlayer-DOCS] CVS: main/DOCS/xml configure,1.14,1.15
- Next message: [MPlayer-DOCS] CVS: homepage/src dload.src.pl, NONE, 1.1 donations.src.pl, NONE, 1.1 info.src.pl, NONE, 1.1 news.src.pl, NONE, 1.1 screen.src.pl, NONE, 1.1
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the MPlayer-DOCS
mailing list