[MPlayer-DOCS] [homepage]: r3505 - in trunk: design6/src/selector design6/src/upper src/news-archive.en src/news.en
diego
subversion at mplayerhq.hu
Thu May 27 23:39:50 CEST 2010
Author: diego
Date: Thu May 27 23:39:48 2010
New Revision: 3505
Log:
Move some old news entries to the archive.
Modified:
trunk/design6/src/selector
trunk/design6/src/upper
trunk/src/news-archive.en
trunk/src/news.en
Modified: trunk/design6/src/selector
==============================================================================
--- trunk/design6/src/selector Thu May 27 23:33:37 2010 (r3504)
+++ trunk/design6/src/selector Thu May 27 23:39:48 2010 (r3505)
@@ -635,7 +635,7 @@
<table class="text" cellpadding="0" cellspacing="0" border="0">
<tr>
- <td width="100%" valign="top" align="left" background="images/b_01b.jpg">
+ <td width="100%" valign="top" align="left" style="background=url(images/b_01b.jpg);">
<img src="images/b_01.jpg" width="324" height="114" border="0" alt=""><br>
</td>
<td width="21" valign="top" align="left">
@@ -644,7 +644,7 @@
</tr>
<tr>
- <td width="100%" valign="top" align="left" background="images/b_04b.jpg">
+ <td width="100%" valign="top" align="left" style="background=url(images/b_04b.jpg);">
<img src="images/b_02.gif" width="21" height="21" border="0" alt=""><a href="news.html"><img src="images/b_03.jpg" width="174" height="21" border="0" alt="MPlayerhq.hu - The Movie Player For Linux"></a><img src="images/b_04.jpg" width="9" height="21" border="0" alt=""><br>
</td>
<td width="21" valign="top" align="left">
@@ -653,7 +653,7 @@
</tr>
<tr>
- <td width="100%" valign="top" align="left" background="images/b_05b.jpg">
+ <td width="100%" valign="top" align="left" style="background=url(images/b_05b.jpg);">
<img src="images/b_05.jpg" width="207" height="29" border="0" alt=""><br>
</td>
<td width="21" valign="top" align="left">
@@ -662,7 +662,7 @@
</tr>
<tr>
- <td width="100%" valign="top" align="left" background="images/b_08b.jpg">
+ <td width="100%" valign="top" align="left" style="background=url(images/b_08b.jpg);">
<img src="images/b_06.jpg" width="20" height="9" border="0" alt=""><img src="images/b_07.jpg" width="173" height="9" border="0" alt="the movie player for Linux - official site"><img src="images/b_08.jpg" width="9" height="9" border="0" alt=""><br>
</td>
<td width="21" valign="top" align="left">
@@ -680,7 +680,7 @@
</tr>
<tr>
- <td width="100%" valign="top" align="left" background="images/lg_bckg.jpg">
+ <td width="100%" valign="top" align="left" style="background=url(images/lg_bckg.jpg);">
<img src="images/nothing.gif" width="1" height="2" border="0" alt=""><br>
</td>
<td width="21" valign="top" align="left">
@@ -689,7 +689,7 @@
</tr>
<tr>
- <td colspan="2" valign="top" align="left" background="images/b_11.jpg" class="front">
+ <td colspan="2" valign="top" align="left" style="background=url(images/b_11.jpg);" class="front">
<!-- end selector -->
Modified: trunk/design6/src/upper
==============================================================================
--- trunk/design6/src/upper Thu May 27 23:33:37 2010 (r3504)
+++ trunk/design6/src/upper Thu May 27 23:39:48 2010 (r3505)
@@ -14,7 +14,7 @@
<table width="100%" cellpadding="0" cellspacing="0" border="0">
<tr>
- <td width="205" valign="top" align="left" bgcolor="#303028" background="images/lg_bckg.jpg">
+ <td class="aligned" width="205" bgcolor="#303028" style="background=url(images/lg_bckg.jpg);">
<img src="images/a_01.jpg" width="205" height="114" border="0" alt=""><br>
<img src="images/a_02.jpg" width="205" height="21" border="0" alt=""><br>
<img src="images/a_03.jpg" width="205" height="29" border="0" alt=""><br>
@@ -24,7 +24,7 @@
<table width="201" cellpadding="0" cellspacing="0" border="0">
<tr>
- <td width="201" valign="top" align="left" background="images/a_06.jpg" class="front">
+ <td class="aligned" width="201" style="background=url(images/a_06.jpg);" class="front">
<table width="201" cellpadding="0" border="0">
Modified: trunk/src/news-archive.en
==============================================================================
--- trunk/src/news-archive.en Thu May 27 23:33:37 2010 (r3504)
+++ trunk/src/news-archive.en Thu May 27 23:39:48 2010 (r3505)
@@ -9,6 +9,434 @@
<div class="newsentry">
<h2>
+ <a name="LinuxTag2008">2008-05-29, Thursday :: MPlayer at LinuxTag 2008</a>
+ <br><span class="poster">posted by Roberto</span>
+</h2>
+
+<p class="left-inset">
+<a href="http://www.linuxtag.org/2008">
+<img src="../images/linuxtag.png" alt="LinuxTag2008" width="119" height="80"></a>
+</p>
+
+<p>
+Also this year MPlayer will be at
+<a href="http://www.linuxtag.org/2008/en/home/welcome.html">LinuxTag</a>.
+You can meet us at Messe Berlin in Hall 7 booth 113, from May 28 to 31.
+</p>
+
+<p>
+This year we're sharing the booth with <a href="http://ffmpeg.org/">FFmpeg</a>
+and <a href="http://opengraphics.org">OGP</a>.
+</p>
+
+<p>
+Come visit us in Berlin!
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="gplv2">2008-04-30, Wednesday :: GPLv2</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<p>
+No, we do not have plans to switch to GPL version 3 at this particular
+point in time. However, we do wish to be compatible with GPL version 3.
+We also wish to have the option of switching licenses available in the
+future. Circumstances making a license upgrade desirable might arise,
+one never knows. Unfortunately there are some bits of code in
+MPlayer, which are licensed as GPL version 2 only. Trying to get in
+contact with the authors of these parts has been fruitless, we have
+had no reaction from them.
+</p>
+
+<p>
+Thus we are looking for help contacting them. Specifically, we are
+searching for the authors of
+(<span style="text-decoration: line-through">crossed out</span>
+authors we already found)
+</p>
+
+<dl>
+<dt><span style="text-decoration: line-through"><code>libmpcodecs/ve_x264.c</code></span></dt>
+<dd>written by Bernhard Rosenkraenzer, last known email
+addresses < bero at arklinux dot org > and
+< bero at redhat dot com ></dd>
+<dt><code>libmpdemux/demux_ty_osd.c</code></dt>
+<dd>written by
+<span style="text-decoration: line-through">
+Mike Baker, last known email address < mbm at linux dot com ></span>
+and Christopher Wingert, last known
+email addresses < cwingert at qualcomm dot com >
+and < mailbox at wingert dot org >
+and < usenet at wingert dot org >
+and < tivo at wingert dot org ></dd>
+<dt><span style="text-decoration: line-through"><code>TOOLS/realcodecs/*</code></span></dt>
+<dd>written by Florian Schneider, last known email address
+< flo-mplayer-dev at gmx dot net >. Note that this is not the Florian
+Schneider from the band Kraftwerk, nor a researcher from the ETH Zürich.</dd>
+</dl>
+
+<p>
+If you know how to get in
+touch with them or if you are one of the people we are seeking, please
+<a href="mailto:webmaster_REMOVE_THE_UNDERSCORES_AND_THE_TEXT_IN_BETWEEN_ at mplayerhq.hu">contact us</a>
+so that we can get these issues resolved. Thanks a bunch.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="dvdnav412">2008-04-15, Tuesday :: libdvdnav-4.1.2 released</a>
+ <br><span class="poster">posted by Dominik</span>
+</h2>
+
+<p>
+On the first anniversary of libdvdnav under the new dev team, we're happy
+to announce a new release. But first, some history.
+</p>
+
+<p>
+As some of you probably know, libdvdnav hasn't been actively developed
+upstream for quite some time. About a year ago, a couple of developers
+related to MPlayer took over the task of maintaining libdvdnav. The first
+release happened quietly on Sunday, October 28th 2007 and now it is time
+for another.
+</p>
+
+<p>
+There have been many improvements to the build system and some bugfixes
+including plugging a few memory leaks since the last release, but no major
+changes.
+</p>
+
+<p>
+libdvdnav-4.1.2 can be downloaded from the following locations. Please be
+kind to our server and use one of our many mirrors.
+</p>
+
+<ul>
+ <li>Switzerland
+ <a href="http://www1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
+ <a href="ftp://ftp1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>Hungary
+ <a href="http://www2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
+ <a href="ftp://ftp2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>USA
+ <a href="http://www3.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a></li>
+ <li>USA
+ <a href="http://www4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
+ <a href="ftp://ftp4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>Korea
+ <a href="http://www5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
+ <a href="ftp://ftp5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>France
+ <a href="ftp://ftp6.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>Germany
+ <a href="http://www7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
+ <a href="ftp://ftp7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+ <li>Germany
+ <a href="ftp://ftp.fu-berlin.de/unix/X11/multimedia/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
+</ul>
+
+<p>
+SHA1SUM: <b>65e8f5aa01a60cf8fd013ef9e5d8c23b9fef21d6</b><br>
+MD5SUM: <b>0e9a494403f9f5a2e781252c77599561</b>
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln19">2008-01-30, Wednesday :: buffer overflow in stream_cddb.c</a>
+ <br><span class="poster">posted by Roberto</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+A buffer overflow was found and reported by Adam Bozanich of Musecurity in the
+code used to extract album titles from CDDB server answers.
+</p>
+
+<p>
+When parsing answers from the CDDB server, the album title is copied into a
+fixed-size buffer with insufficient size checks, which may cause a buffer
+overflow. A malicious database entry could trigger a buffer overflow in the
+program. That can lead to arbitrary code execution with the UID of the user
+running MPlayer.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary code execution under the user ID running the player) when
+getting disk information from a malicious CDDB entry, null if you do not use
+this feature. Please note that it is possible to overwrite entries in the CDDB
+database, so an attack can also be performed via a non-compromised server. At
+the time the buffer overflow was fixed there was no known exploit in the wild.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A
+<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=25820&r2=25824">fix</a>
+for this problem was committed to SVN on Sun Jan 20 20:58:02 2008 UTC as r25824.
+Users of affected MPlayer versions should download a
+<a href="../MPlayer/patches/stream_cddb_fix_20080120.diff">patch</a>
+for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
+</p>
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0rc2 and SVN before r25824 (Sun Jan 20 20:58:02 2008 UTC).
+Older versions are probably affected, but they were not checked.
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+SVN HEAD after r25824 (Sun Jan 20 20:58:02 2008 UTC)<br>
+MPlayer 1.0rc2 + security patches
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln18">2008-01-30, Wednesday :: buffer overflow in url.c</a>
+ <br><span class="poster">posted by Roberto</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+A buffer overflow was found and reported by Adam Bozanich of Musecurity in the
+code used to escape URL strings.
+</p>
+
+<p>
+The code used to skip over IPv6 addresses can be tricked into leaving a pointer
+to a temporary buffer with a non-NULL value; this causes the unescape code to
+reuse the buffer, and may lead to a buffer overflow if the old buffer is
+smaller than required. A malicious URL string may be used to trigger a buffer
+overflow in the program, that can lead to arbitrary code execution with the
+UID of the user running MPlayer.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary code execution under the user ID running the player) if you can
+play untrusted URLs (e.g. delivered by a remote playlist), null if you do not
+use this feature. At the time the buffer overflow was fixed there was no known
+exploit in the wild.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A
+<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/url.c?r1=25648&r2=25823">fix</a>
+for this problem was committed to SVN on Sun Jan 20 20:43:46 2008 UTC as r25823.
+Users of affected MPlayer versions should download a
+<a href="../MPlayer/patches/url_fix_20080120.diff">patch</a>
+for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
+</p>
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0rc2 and SVN before r25823 (Sun Jan 20 20:43:46 2008 UTC).
+Older versions are probably affected, but they were not checked.
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+SVN HEAD after r25823 (Sun Jan 20 20:43:46 2008 UTC)<br>
+MPlayer 1.0rc2 + security patches
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln17">2008-01-29, Tuesday :: buffer overflow in demux_mov.c</a>
+ <br><span class="poster">posted by Roberto</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+A buffer overflow was found and reported by Felipe Manzano and Anibal Sacco of
+CORE Security Technologies in the code used to parse MOV file headers.
+Other similar issues were found by Reimar Döffinger while fixing the code.
+The vulnerability is identified as CORE-2008-0122.
+</p>
+
+<p>
+The code read some values from the file and used them as indexes into an array
+allocated on the heap without performing any boundary check. A malicious file
+may be used to trigger a buffer overflow in the program. That can lead to
+arbitrary code execution with the UID of the user running MPlayer.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary code execution under the user ID running the player) when
+playing a malicious MOV file, null if you do not use this feature. At the time
+the buffer overflow was fixed there was no known exploit in the wild.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A
+<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_mov.c?r1=25920&r2=25922">fix</a>
+for this problem was committed to SVN on Tue Jan 29 22:13:20 2008 UTC as r25920,
+Tue Jan 29 22:13:47 2008 UTC as r25921 and Tue Jan 29 22:14:00 2008 UTC as
+r25922.
+Users of affected MPlayer versions should download a
+<a href="../MPlayer/patches/demux_mov_fix_20080129.diff">patch</a>
+for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
+</p>
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0rc2 and SVN before r25922 (Tue Jan 29 22:14:00 2008 UTC).
+Older versions are probably affected, but they were not checked.
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+SVN HEAD after r25922 (Tue Jan 29 22:14:00 2008 UTC)<br>
+MPlayer 1.0rc2 + security patches
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln16">2008-01-29, Tuesday :: stack overflow in demux_audio.c</a>
+ <br><span class="poster">posted by Roberto</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+A stack overflow was found and reported by Damian Frizza and Alfredo Ortega of
+CORE Security Technologies in the code used to parse FLAC comments. The
+vulnerability is identified as CORE-2008-1218.
+</p>
+
+<p>
+When loading a comment from the file, a length value is read from the file and
+then used as an index to a VLA array with no check performed. A malicious file
+could trigger a stack overflow in the program, leading to arbitrary code
+execution with the UID of the user running MPlayer.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary code execution under the user ID running the player) when
+playing a FLAC file with malicious comments, null if you do not use this
+feature. At the time the buffer overflow was fixed there was no known exploit
+in the wild.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A
+<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_audio.c?r1=25911&r2=25917">fix</a>
+for this problem was committed to SVN on Tue Jan 29 22:00:58 2008 UTC as r25917.
+Users of affected MPlayer versions should download a
+<a href="../MPlayer/patches/demux_audio_fix_20080129.diff">patch</a>
+for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
+</p>
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0rc2 and SVN before r25917 (Tue Jan 29 22:00:58 2008 UTC).
+Older versions are probably affected, but they were not checked.
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+SVN HEAD after r25917 (Tue Jan 29 22:00:58 2008 UTC)<br>
+MPlayer 1.0rc2 + security patches
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="HUPAward2007">2008-01-03, Wednesday :: HUP Readers' Choice Award 2007</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<p class="left-inset">
+<a href="http://hup.hu/node/33504">
+<img src="../images/awards/hup2007.png" alt="HUP Readers' Choice Award 2007" width="120" height="120"></a>
+</p>
+
+<p>
+Like every year the <a href="http://hup.hu">Hungarian Unix Portal</a> has
+held its annual Readers' Choice Award and MPlayer + its frontends came out
+on top of the "favorite video player" category.
+MPlayer got 600 votes (61%), placing it before VLC with 231 (23%) and
+Totem with 49 (5%).
+</p>
+
+<p>
+If you can read Hungarian, check out the
+<a href="http://hup.hu/node/48704">HUP award page</a>.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
<a name="mplayer10rc2">2007-10-07, Sunday :: MPlayer 1.0rc2 released</a>
<br><span class="poster">posted by the release team</span>
</h2>
Modified: trunk/src/news.en
==============================================================================
--- trunk/src/news.en Thu May 27 23:33:37 2010 (r3504)
+++ trunk/src/news.en Thu May 27 23:39:48 2010 (r3505)
@@ -556,433 +556,4 @@
</div>
-<div class="newsentry">
-
-<h2>
- <a name="LinuxTag2008">2008-05-29, Thursday :: MPlayer at LinuxTag 2008</a>
- <br><span class="poster">posted by Roberto</span>
-</h2>
-
-<p class="left-inset">
-<a href="http://www.linuxtag.org/2008">
-<img src="../images/linuxtag.png" alt="LinuxTag2008" width="119" height="80"></a>
-</p>
-
-<p>
-Also this year MPlayer will be at
-<a href="http://www.linuxtag.org/2008/en/home/welcome.html">LinuxTag</a>.
-You can meet us at Messe Berlin in Hall 7 booth 113, from May 28 to 31.
-</p>
-
-<p>
-This year we're sharing the booth with <a href="http://ffmpeg.org/">FFmpeg</a>
-and <a href="http://opengraphics.org">OGP</a>.
-</p>
-
-<p>
-Come visit us in Berlin!
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="gplv2">2008-04-30, Wednesday :: GPLv2</a>
- <br><span class="poster">posted by Diego</span>
-</h2>
-
-<p>
-No, we do not have plans to switch to GPL version 3 at this particular
-point in time. However, we do wish to be compatible with GPL version 3.
-We also wish to have the option of switching licenses available in the
-future. Circumstances making a license upgrade desirable might arise,
-one never knows. Unfortunately there are some bits of code in
-MPlayer, which are licensed as GPL version 2 only. Trying to get in
-contact with the authors of these parts has been fruitless, we have
-had no reaction from them.
-</p>
-
-<p>
-Thus we are looking for help contacting them. Specifically, we are
-searching for the authors of
-(<span style="text-decoration: line-through">crossed out</span>
-authors we already found)
-</p>
-
-<dl>
-<dt><span style="text-decoration: line-through"><code>libmpcodecs/ve_x264.c</code></span></dt>
-<dd>written by Bernhard Rosenkraenzer, last known email
-addresses < bero at arklinux dot org > and
-< bero at redhat dot com ></dd>
-<dt><code>libmpdemux/demux_ty_osd.c</code></dt>
-<dd>written by
-<span style="text-decoration: line-through">
-Mike Baker, last known email address < mbm at linux dot com ></span>
-and Christopher Wingert, last known
-email addresses < cwingert at qualcomm dot com >
-and < mailbox at wingert dot org >
-and < usenet at wingert dot org >
-and < tivo at wingert dot org ></dd>
-<dt><span style="text-decoration: line-through"><code>TOOLS/realcodecs/*</code></span></dt>
-<dd>written by Florian Schneider, last known email address
-< flo-mplayer-dev at gmx dot net >. Note that this is not the Florian
-Schneider from the band Kraftwerk, nor a researcher from the ETH Zürich.</dd>
-</dl>
-
-<p>
-If you know how to get in
-touch with them or if you are one of the people we are seeking, please
-<a href="mailto:webmaster_REMOVE_THE_UNDERSCORES_AND_THE_TEXT_IN_BETWEEN_ at mplayerhq.hu">contact us</a>
-so that we can get these issues resolved. Thanks a bunch.
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="dvdnav412">2008-04-15, Tuesday :: libdvdnav-4.1.2 released</a>
- <br><span class="poster">posted by Dominik</span>
-</h2>
-
-<p>
-On the first anniversary of libdvdnav under the new dev team, we're happy
-to announce a new release. But first, some history.
-</p>
-
-<p>
-As some of you probably know, libdvdnav hasn't been actively developed
-upstream for quite some time. About a year ago, a couple of developers
-related to MPlayer took over the task of maintaining libdvdnav. The first
-release happened quietly on Sunday, October 28th 2007 and now it is time
-for another.
-</p>
-
-<p>
-There have been many improvements to the build system and some bugfixes
-including plugging a few memory leaks since the last release, but no major
-changes.
-</p>
-
-<p>
-libdvdnav-4.1.2 can be downloaded from the following locations. Please be
-kind to our server and use one of our many mirrors.
-</p>
-
-<ul>
- <li>Switzerland
- <a href="http://www1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
- <a href="ftp://ftp1.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>Hungary
- <a href="http://www2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
- <a href="ftp://ftp2.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>USA
- <a href="http://www3.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a></li>
- <li>USA
- <a href="http://www4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
- <a href="ftp://ftp4.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>Korea
- <a href="http://www5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
- <a href="ftp://ftp5.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>France
- <a href="ftp://ftp6.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>Germany
- <a href="http://www7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">HTTP</a>
- <a href="ftp://ftp7.mplayerhq.hu/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
- <li>Germany
- <a href="ftp://ftp.fu-berlin.de/unix/X11/multimedia/MPlayer/releases/dvdnav/libdvdnav-4.1.2.tar.gz">FTP</a></li>
-</ul>
-
-<p>
-SHA1SUM: <b>65e8f5aa01a60cf8fd013ef9e5d8c23b9fef21d6</b><br>
-MD5SUM: <b>0e9a494403f9f5a2e781252c77599561</b>
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="vuln19">2008-01-30, Wednesday :: buffer overflow in stream_cddb.c</a>
- <br><span class="poster">posted by Roberto</span>
-</h2>
-
-<h3>Summary</h3>
-
-<p>
-A buffer overflow was found and reported by Adam Bozanich of Musecurity in the
-code used to extract album titles from CDDB server answers.
-</p>
-
-<p>
-When parsing answers from the CDDB server, the album title is copied into a
-fixed-size buffer with insufficient size checks, which may cause a buffer
-overflow. A malicious database entry could trigger a buffer overflow in the
-program. That can lead to arbitrary code execution with the UID of the user
-running MPlayer.
-</p>
-
-<h3>Severity</h3>
-
-<p>
-High (arbitrary code execution under the user ID running the player) when
-getting disk information from a malicious CDDB entry, null if you do not use
-this feature. Please note that it is possible to overwrite entries in the CDDB
-database, so an attack can also be performed via a non-compromised server. At
-the time the buffer overflow was fixed there was no known exploit in the wild.
-</p>
-
-<h3>Solution</h3>
-
-<p>
-A
-<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/stream_cddb.c?r1=25820&r2=25824">fix</a>
-for this problem was committed to SVN on Sun Jan 20 20:58:02 2008 UTC as r25824.
-Users of affected MPlayer versions should download a
-<a href="../MPlayer/patches/stream_cddb_fix_20080120.diff">patch</a>
-for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
-</p>
-
-<h3>Affected versions</h3>
-
-<p>
-MPlayer 1.0rc2 and SVN before r25824 (Sun Jan 20 20:58:02 2008 UTC).
-Older versions are probably affected, but they were not checked.
-</p>
-
-
-<h3>Unaffected versions</h3>
-
-<p>
-SVN HEAD after r25824 (Sun Jan 20 20:58:02 2008 UTC)<br>
-MPlayer 1.0rc2 + security patches
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="vuln18">2008-01-30, Wednesday :: buffer overflow in url.c</a>
- <br><span class="poster">posted by Roberto</span>
-</h2>
-
-<h3>Summary</h3>
-
-<p>
-A buffer overflow was found and reported by Adam Bozanich of Musecurity in the
-code used to escape URL strings.
-</p>
-
-<p>
-The code used to skip over IPv6 addresses can be tricked into leaving a pointer
-to a temporary buffer with a non-NULL value; this causes the unescape code to
-reuse the buffer, and may lead to a buffer overflow if the old buffer is
-smaller than required. A malicious URL string may be used to trigger a buffer
-overflow in the program, that can lead to arbitrary code execution with the
-UID of the user running MPlayer.
-</p>
-
-<h3>Severity</h3>
-
-<p>
-High (arbitrary code execution under the user ID running the player) if you can
-play untrusted URLs (e.g. delivered by a remote playlist), null if you do not
-use this feature. At the time the buffer overflow was fixed there was no known
-exploit in the wild.
-</p>
-
-<h3>Solution</h3>
-
-<p>
-A
-<a href="http://svn.mplayerhq.hu/mplayer/trunk/stream/url.c?r1=25648&r2=25823">fix</a>
-for this problem was committed to SVN on Sun Jan 20 20:43:46 2008 UTC as r25823.
-Users of affected MPlayer versions should download a
-<a href="../MPlayer/patches/url_fix_20080120.diff">patch</a>
-for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
-</p>
-
-<h3>Affected versions</h3>
-
-<p>
-MPlayer 1.0rc2 and SVN before r25823 (Sun Jan 20 20:43:46 2008 UTC).
-Older versions are probably affected, but they were not checked.
-</p>
-
-
-<h3>Unaffected versions</h3>
-
-<p>
-SVN HEAD after r25823 (Sun Jan 20 20:43:46 2008 UTC)<br>
-MPlayer 1.0rc2 + security patches
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="vuln17">2008-01-29, Tuesday :: buffer overflow in demux_mov.c</a>
- <br><span class="poster">posted by Roberto</span>
-</h2>
-
-<h3>Summary</h3>
-
-<p>
-A buffer overflow was found and reported by Felipe Manzano and Anibal Sacco of
-CORE Security Technologies in the code used to parse MOV file headers.
-Other similar issues were found by Reimar Döffinger while fixing the code.
-The vulnerability is identified as CORE-2008-0122.
-</p>
-
-<p>
-The code read some values from the file and used them as indexes into an array
-allocated on the heap without performing any boundary check. A malicious file
-may be used to trigger a buffer overflow in the program. That can lead to
-arbitrary code execution with the UID of the user running MPlayer.
-</p>
-
-<h3>Severity</h3>
-
-<p>
-High (arbitrary code execution under the user ID running the player) when
-playing a malicious MOV file, null if you do not use this feature. At the time
-the buffer overflow was fixed there was no known exploit in the wild.
-</p>
-
-<h3>Solution</h3>
-
-<p>
-A
-<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_mov.c?r1=25920&r2=25922">fix</a>
-for this problem was committed to SVN on Tue Jan 29 22:13:20 2008 UTC as r25920,
-Tue Jan 29 22:13:47 2008 UTC as r25921 and Tue Jan 29 22:14:00 2008 UTC as
-r25922.
-Users of affected MPlayer versions should download a
-<a href="../MPlayer/patches/demux_mov_fix_20080129.diff">patch</a>
-for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
-</p>
-
-<h3>Affected versions</h3>
-
-<p>
-MPlayer 1.0rc2 and SVN before r25922 (Tue Jan 29 22:14:00 2008 UTC).
-Older versions are probably affected, but they were not checked.
-</p>
-
-
-<h3>Unaffected versions</h3>
-
-<p>
-SVN HEAD after r25922 (Tue Jan 29 22:14:00 2008 UTC)<br>
-MPlayer 1.0rc2 + security patches
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="vuln16">2008-01-29, Tuesday :: stack overflow in demux_audio.c</a>
- <br><span class="poster">posted by Roberto</span>
-</h2>
-
-<h3>Summary</h3>
-
-<p>
-A stack overflow was found and reported by Damian Frizza and Alfredo Ortega of
-CORE Security Technologies in the code used to parse FLAC comments. The
-vulnerability is identified as CORE-2008-1218.
-</p>
-
-<p>
-When loading a comment from the file, a length value is read from the file and
-then used as an index to a VLA array with no check performed. A malicious file
-could trigger a stack overflow in the program, leading to arbitrary code
-execution with the UID of the user running MPlayer.
-</p>
-
-<h3>Severity</h3>
-
-<p>
-High (arbitrary code execution under the user ID running the player) when
-playing a FLAC file with malicious comments, null if you do not use this
-feature. At the time the buffer overflow was fixed there was no known exploit
-in the wild.
-</p>
-
-<h3>Solution</h3>
-
-<p>
-A
-<a href="http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_audio.c?r1=25911&r2=25917">fix</a>
-for this problem was committed to SVN on Tue Jan 29 22:00:58 2008 UTC as r25917.
-Users of affected MPlayer versions should download a
-<a href="../MPlayer/patches/demux_audio_fix_20080129.diff">patch</a>
-for MPlayer 1.0rc2 or update to the latest version if they are using SVN.
-</p>
-
-<h3>Affected versions</h3>
-
-<p>
-MPlayer 1.0rc2 and SVN before r25917 (Tue Jan 29 22:00:58 2008 UTC).
-Older versions are probably affected, but they were not checked.
-</p>
-
-
-<h3>Unaffected versions</h3>
-
-<p>
-SVN HEAD after r25917 (Tue Jan 29 22:00:58 2008 UTC)<br>
-MPlayer 1.0rc2 + security patches
-</p>
-
-</div>
-
-
-
-<div class="newsentry">
-
-<h2>
- <a name="HUPAward2007">2008-01-03, Wednesday :: HUP Readers' Choice Award 2007</a>
- <br><span class="poster">posted by Diego</span>
-</h2>
-
-<p class="left-inset">
-<a href="http://hup.hu/node/33504">
-<img src="../images/awards/hup2007.png" alt="HUP Readers' Choice Award 2007" width="120" height="120"></a>
-</p>
-
-<p>
-Like every year the <a href="http://hup.hu">Hungarian Unix Portal</a> has
-held its annual Readers' Choice Award and MPlayer + its frontends came out
-on top of the "favorite video player" category.
-MPlayer got 600 votes (61%), placing it before VLC with 231 (23%) and
-Totem with 49 (5%).
-</p>
-
-<p>
-If you can read Hungarian, check out the
-<a href="http://hup.hu/node/48704">HUP award page</a>.
-</p>
-
-</div>
-
-<br>
-
-
<!-- content end -->
More information about the MPlayer-DOCS
mailing list