aboutsummaryrefslogtreecommitdiff
path: root/multimedia/mencoder
diff options
context:
space:
mode:
authorThomas Zander <riggs@FreeBSD.org>2016-01-17 10:21:21 +0000
committerThomas Zander <riggs@FreeBSD.org>2016-01-17 10:21:21 +0000
commita61a04cd147f9d53b197dcbeb50bc38eb21bd731 (patch)
treed685e2803c84b71b0f4fb0d229f4fc51ce9a8a06 /multimedia/mencoder
parentd1dc0236ef76783864bcde9be689af7bc467ab7a (diff)
downloadports-a61a04cd147f9d53b197dcbeb50bc38eb21bd731.tar.gz
ports-a61a04cd147f9d53b197dcbeb50bc38eb21bd731.zip
Build with ffmpeg-2.8.5; fix zero-day remote vulnerability
Both mentioned CVE IDs refer to vulnerabilities where a remote attacker can read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file. Building with 2.8.5 fixes those. MFH: 2016Q1 Security: CVE-2016-1897 CVE-2016-1898
Notes
Notes: svn path=/head/; revision=406295
Diffstat (limited to 'multimedia/mencoder')
-rw-r--r--multimedia/mencoder/Makefile2
-rw-r--r--multimedia/mencoder/distinfo4
2 files changed, 3 insertions, 3 deletions
diff --git a/multimedia/mencoder/Makefile b/multimedia/mencoder/Makefile
index c80c7e6b7511..4aee12eb4547 100644
--- a/multimedia/mencoder/Makefile
+++ b/multimedia/mencoder/Makefile
@@ -3,7 +3,7 @@
PORTNAME= mencoder
PORTVERSION= ${MPLAYER_PORT_VERSION}
-PORTREVISION= 1
+PORTREVISION= 2
CATEGORIES= multimedia audio
MAINTAINER= riggs@FreeBSD.org
diff --git a/multimedia/mencoder/distinfo b/multimedia/mencoder/distinfo
index 4d95ebb1012e..22c66ed737eb 100644
--- a/multimedia/mencoder/distinfo
+++ b/multimedia/mencoder/distinfo
@@ -1,4 +1,4 @@
-SHA256 (ffmpeg-2.8.4.tar.bz2) = 83cc8136a7845546062a43cda9ae3cf0a02f43ef5e434d2f997f055231a75f8e
-SIZE (ffmpeg-2.8.4.tar.bz2) = 8579383
+SHA256 (ffmpeg-2.8.5.tar.bz2) = 3b6d9951533323ee64a21d0aa7667a780b3470bfe4e0fb7c1b33307ce290615a
+SIZE (ffmpeg-2.8.5.tar.bz2) = 8580755
SHA256 (mplayer-1.2.20151219.tar.xz) = f11d1100a1c37ec9e3e19c7698baf77871ae305ae431ec4a3dc187ca9316e4a2
SIZE (mplayer-1.2.20151219.tar.xz) = 5167716