diff options
author | Anton Khirnov <anton@khirnov.net> | 2016-01-20 11:11:38 +0100 |
---|---|---|
committer | Anton Khirnov <anton@khirnov.net> | 2016-02-22 11:48:30 +0100 |
commit | ec4c48397641dbaf4ae8df36c32aaa5a311a11bf (patch) | |
tree | 04b1a3187ffa6c4a1821eb5d6dc70ac8397b5006 /libavformat/smoothstreamingenc.c | |
parent | 8c0ceafb0f25da077ff23e394667119f031574fd (diff) | |
download | ffmpeg-ec4c48397641dbaf4ae8df36c32aaa5a311a11bf.tar.gz |
lavf: add a protocol whitelist/blacklist for file opened internally
Should make the default behaviour safer for careless callers that open
random untrusted files.
Bug-Id: CVE-2016-1897
Bug-Id: CVE-2016-1898
Diffstat (limited to 'libavformat/smoothstreamingenc.c')
-rw-r--r-- | libavformat/smoothstreamingenc.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/libavformat/smoothstreamingenc.c b/libavformat/smoothstreamingenc.c index cfb1f8f1c9..1dbae7013d 100644 --- a/libavformat/smoothstreamingenc.c +++ b/libavformat/smoothstreamingenc.c @@ -312,7 +312,7 @@ static int ism_write_header(AVFormatContext *s) goto fail; } - c->protocols = ffurl_get_protocols(NULL, NULL); + c->protocols = ffurl_get_protocols(s->protocol_whitelist, s->protocol_blacklist); if (!c->protocols) { ret = AVERROR(ENOMEM); goto fail; |