about this next to the relevant piece of code. Looking at the CVS logs,
it's the 3rd time I fix this. This, in turn, fixes the build of libdlna.
To fix the package, use the "proper" syntax to enable PIC within the
configure script, instead of applying what seems to be a hack. As before,
i386 is left PIC-less or otherwise ffmpeg breaks.
Tested on macppc and amd64.
OpenBSD too since they probably do but we probably won't hear from
anyone about that directly. PKGREVISION -> 3.
Note that at least on NetBSD __STDC_CONSTANT_MACROS is apparently
already defined here (at least when building graphics/osg, maybe not
always) so this patch may not really be the right approach, but it
works...
* 2872918, MKV: add support for default and forced track flags
* 3418881, RK Audio format support, thanks to Lionel Duchateau
* 3418883, LA: version field, thanks to Lionel Duchateau
* MPEG-4: basic support of Aigo .3dv files
* MPEG-2 Video: color display info (colour_primaries, transfer_characteristics,
matrix_coefficients)
* QuickTime: color display info (colour_primaries, transfer_characteristics,
matrix_coefficients)
* QuickTime: ProRes LT, Proxy, 4:4:4 profiles detection
* QuickTime: mpeg CodecID support
* Template inputs are now insensitive to carriage return kind
* MPEG-TS: Support of ISO 8859-2 in EPG
* MPEG-4: more CodedIDs supported
* GXF: more info about DV streams
* GXF: Handling of files with more than 1 Time code
* 3414326, GXF: using only the first map chunk for duration calculation
* 3414513, Id3v2: was not able to extract covers with UTF-16 description
* 3417908, video from several files: crash if there is not enough place for the
frame number
* 3433602, DVD-Video (IFO): Crash when scanning some malformed IFO files
* Matroska: parser hanging in case of huge zero-padded files
* MPEG-4: was not providing some info about tracks with sample table before
media header
* MXF: better support of corrupted indexes
* 3429831, MediaInfo library: unload wrong DLL, thanks to McSpecky
* MPEG-TS: Better handling of EPG running_status flag
* MXF: Handling of "file:///" in Network loacators
* FLV: audio delay was sometimes wrong
* H264: Buffer size was in bytes instead of bits like with other formats
* 3429196: no output if absolute file name, on Linux
* 3187050, FLV: wrong detection when FLV header is corrupt
* BLu-ray: crash if MPLS files are on the root of a disk
* Blu-ray: parsing was very slow if MPLS was pointing thousands of times on the
same file
* 3292830, Matroska: crash if AAC sample rate is not provided by the container
ffmpeg itself built fine on DragonFly, but other code trying to use this
library (e.g. audio/akode-plugins-ffmpeg) would not build, stopping with
an error like:
common.h:154 error: `UINT64_C` was not declared in this scope
The provided patch fixes this breakage. For conservative reasons, the
code only applies to DragonFly, but if other platforms are seeing the
same error, then the patch's macro should be expanded to include those
other platforms as well.
The libgstshm plugin was building on DragonFly, but it wasn't in the PLIST.
Rather than conditionally add it to the PLIST, instead shm was added to
the disabled list. This now builds cleanly with PKG_DEVELOPER=yes.
DragonFly builds with two plugins that NetBSD suppresses, but these
plugins were not on PLIST although the definition of suitable PLIST
variables suggest this was intended originally. The plugins have
been conditionally added to the PLIST to properly support DragonFly.
Changes from 10.3.183.7
Critical vulnerabilities have been identified in Adobe Flash Player
11.0.1.152 and earlier versions for Windows, Macintosh, Linux and
Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions
for Android. These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier
versions for Windows, Macintosh, Linux and Solaris update to Adobe
Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153
and earlier versions for Android should update to Adobe Flash Player
11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows,
Macintosh, and Android should update to Adobe AIR 3.1.0.4880.
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).
This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).
This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).
This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).
... now after reading the above, just how happy are people running this code
from their browsers?
Changes from 11.0.1.152
Critical vulnerabilities have been identified in Adobe Flash Player
11.0.1.152 and earlier versions for Windows, Macintosh, Linux and
Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions
for Android. These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier
versions for Windows, Macintosh, Linux and Solaris update to Adobe
Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153
and earlier versions for Android should update to Adobe Flash Player
11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows,
Macintosh, and Android should update to Adobe AIR 3.1.0.4880.
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).
This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).
This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).
This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).
... now after reading the above, just how happy are people running this code
from their browsers?
This is based on Ryo ONODERA's wip package with some pkglint and MESSAGE
shuffling from me (any issues seen are likely to be due to that rather
than the original package).
Netscape compatible plugin for Adobe Flash player. This package
contains a plugin that enables web browsers to render the Flash
format.
The nspluginwrapper option (enabled by default on non Linux platforms)
permits the use of the the Linux x86 flash player in Firefox browsers
on other x86 systems and x86_64 systems.
For NetBSD this package requires emul.linux.kern.osrelease = 2.6.18
or later, which means it will not work on NetBSD 5.x or older
systems.
Changelog:
2011-08-15 v0.9.7-p1 "Cayuga" patch 1
This is an incremental bugfix release against Cayuga. All users of that
release are strongly encouraged to upgrade.
- Fix potential OOB reads (cdae03a)
An unbounded out of bounds read was discovered when the
decoder was requested to perform error concealment (new in
Cayuga) given a frame with corrupt partition sizes.
A bounded out of bounds read was discovered affecting all
versions of libvpx. Given an multipartition input frame that
is truncated between the mode/mv partition and the first
residiual paritition (in the block of partition offsets), up
to 3 extra bytes could have been read from the source buffer.
The code will not take any action regardless of the contents
of these undefined bytes, as the truncated buffer is detected
immediately following the read based on the calculated
starting position of the coefficient partition.
- Fix potential error concealment crash when the very first frame
is missing or corrupt (a609be5)
- Fix significant artifacts in error concealment (a4c2211, 99d870a)
- Revert 1-pass CBR rate control changes (e961317)
Further testing showed this change produced undesirable visual
artifacts, rolling back for now.