From owner-freebsd-multimedia@freebsd.org Fri Aug 4 22:29:07 2017 Return-Path: Delivered-To: freebsd-multimedia@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AB631DCC56B for ; Fri, 4 Aug 2017 22:29:07 +0000 (UTC) (envelope-from andyf@andyit.com.au) Received: from alpine.spintel.net.au (alpine.spintel.net.au [IPv6:2407:e400:1::b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 55E3F7E79E for ; Fri, 4 Aug 2017 22:29:07 +0000 (UTC) (envelope-from andyf@andyit.com.au) Received: from drunkfish.andyit.com.au (unknown [210.1.210.40]) by alpine.spintel.net.au (Postfix) with ESMTPS id 4E0DF4C2D4E for ; Sat, 5 Aug 2017 08:28:55 +1000 (AEST) Received: from snuggles.andyit.com.au (snuggles.andyit.com.au [172.22.2.2]) by drunkfish.andyit.com.au (8.15.2/8.15.2) with ESMTP id v74MSsKv052514 for ; Sat, 5 Aug 2017 08:28:54 +1000 (AEST) (envelope-from andyf@andyit.com.au) Message-ID: <5984F526.8090800@andyit.com.au> Date: Sat, 05 Aug 2017 08:28:54 +1000 From: Andy Farkas User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:13.0) Gecko/20120614 Thunderbird/13.0 MIME-Version: 1.0 To: freebsd-multimedia@freebsd.org Subject: avidemux-2.6.11_5 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-multimedia@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Multimedia discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Aug 2017 22:29:07 -0000 I'm trying to build avidemux from ports but it doesn't work: root@myhost:/usr/ports/multimedia/avidemux # make all ===> avidemux-2.6.11_5 has known vulnerabilities: avidemux-2.6.11_5 is vulnerable: ffmpeg -- multiple vulnerabilities CVE: CVE-2015-8663 CVE: CVE-2015-8662 WWW: https://vuxml.FreeBSD.org/freebsd/4bae544d-06a3-4352-938c-b3bcbca89298.html ... Really? Vulnerabilities from 2015? How does the official package builder build this package? Yes, I see the message that says use 'make DISABLE_VULNERABILITIES=yes' Also it seems the latest version is 2.6.20 -andyf