aboutsummaryrefslogtreecommitdiffstats
path: root/multimedia
diff options
context:
space:
mode:
authorriggs <riggs@FreeBSD.org>2016-01-17 17:58:37 +0800
committerriggs <riggs@FreeBSD.org>2016-01-17 17:58:37 +0800
commitde868d0da69e29bd8b9fd73de6ea9119b9370f34 (patch)
tree1c2c79336121b34f270cb27ebc4889e683a6784c /multimedia
parente806cc1fb4cd8a220b5220c370724a34d1f45498 (diff)
downloadfreebsd-ports-gnome-de868d0da69e29bd8b9fd73de6ea9119b9370f34.tar.gz
freebsd-ports-gnome-de868d0da69e29bd8b9fd73de6ea9119b9370f34.tar.zst
freebsd-ports-gnome-de868d0da69e29bd8b9fd73de6ea9119b9370f34.zip
Upgrade to upstream release 2.8.5; fix zero-day remote vulnerability
Both mentioned CVE IDs refer to vulnerabilities where a remote attacker can read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file. The new release fixes those in the process. PR: 206282 Reported by: sasamotikomi@gmail.com MFH: 2016Q1 Security: CVE-2016-1897 CVE-2016-1898
Diffstat (limited to 'multimedia')
-rw-r--r--multimedia/ffmpeg/Makefile2
-rw-r--r--multimedia/ffmpeg/distinfo4
2 files changed, 3 insertions, 3 deletions
diff --git a/multimedia/ffmpeg/Makefile b/multimedia/ffmpeg/Makefile
index 6ae153bc6c84..18f018bd72e1 100644
--- a/multimedia/ffmpeg/Makefile
+++ b/multimedia/ffmpeg/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= ffmpeg
-PORTVERSION= 2.8.4
+PORTVERSION= 2.8.5
PORTEPOCH= 1
CATEGORIES= multimedia audio ipv6 net
MASTER_SITES= http://ffmpeg.org/releases/
diff --git a/multimedia/ffmpeg/distinfo b/multimedia/ffmpeg/distinfo
index fcd1242f0c4c..da729d7f3d1a 100644
--- a/multimedia/ffmpeg/distinfo
+++ b/multimedia/ffmpeg/distinfo
@@ -1,2 +1,2 @@
-SHA256 (ffmpeg-2.8.4.tar.bz2) = 83cc8136a7845546062a43cda9ae3cf0a02f43ef5e434d2f997f055231a75f8e
-SIZE (ffmpeg-2.8.4.tar.bz2) = 8579383
+SHA256 (ffmpeg-2.8.5.tar.bz2) = 3b6d9951533323ee64a21d0aa7667a780b3470bfe4e0fb7c1b33307ce290615a
+SIZE (ffmpeg-2.8.5.tar.bz2) = 8580755