Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Aug 2015 07:31:35 +0000 (UTC)
From:      Koop Mast <kwm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r394007 - head/security/vuxml
Message-ID:  <201508120731.t7C7VZfi098106@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: kwm
Date: Wed Aug 12 07:31:35 2015
New Revision: 394007
URL: https://svnweb.freebsd.org/changeset/ports/394007

Log:
  Document newest flash vulnabilities.
  Also list the c6_64 flash port.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Aug 12 07:16:36 2015	(r394006)
+++ head/security/vuxml/vuln.xml	Wed Aug 12 07:31:35 2015	(r394007)
@@ -58,6 +58,98 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="f3778328-d288-4b39-86a4-65877331eaf7">
+    <topic>Adobe Flash Player -- critical vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>linux-c6-flashplugin</name>
+	<name>linux-c6_64-flashplugin</name>
+	<range><lt>11.2r202.508</lt></range>
+      </package>
+      <package>
+	<name>linux-f10-flashplugin</name>
+	<range><lt>11.2r202.508</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Adobe reports:</p>
+	<blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb15-19.html">;
+	  <p>Adobe has released security updates for Adobe Flash Player.
+	    These updates address critical vulnerabilities that could
+	    potentially allow an attacker to take control of the affected
+	    system.</p>
+	  <p>These updates resolve type confusion vulnerabilities that could
+	    lead to code execution (CVE-2015-5128, CVE-2015-5554,
+	    CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).</p>
+	  <p>These updates include further hardening to a mitigation
+	    introduced in version 18.0.0.209 to defend against vector
+	    length corruptions (CVE-2015-5125).</p>
+	  <p>These updates resolve use-after-free vulnerabilities that could
+	    lead to code execution (CVE-2015-5550, CVE-2015-5551,
+	    CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134,
+	    CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559,
+	    CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124,
+	    CVE-2015-5564).</p>
+	  <p>These updates resolve heap buffer overflow vulnerabilities
+	    that could lead to code execution (CVE-2015-5129,
+	    CVE-2015-5541).</p>
+	  <p>These updates resolve buffer overflow vulnerabilities that
+	    could lead to code execution (CVE-2015-5131, CVE-2015-5132,
+	    CVE-2015-5133).</p>
+	  <p>These updates resolve memory corruption vulnerabilities that
+	    could lead to code execution (CVE-2015-5544, CVE-2015-5545,
+	    CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549,
+	    CVE-2015-5552, CVE-2015-5553).</p>
+	  <p>These updates resolve an integer overflow vulnerability that
+	    could lead to code execution (CVE-2015-5560).</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-3107</cvename>
+      <cvename>CVE-2015-5124</cvename>
+      <cvename>CVE-2015-5125</cvename>
+      <cvename>CVE-2015-5127</cvename>
+      <cvename>CVE-2015-5128</cvename>
+      <cvename>CVE-2015-5129</cvename>
+      <cvename>CVE-2015-5130</cvename>
+      <cvename>CVE-2015-5131</cvename>
+      <cvename>CVE-2015-5132</cvename>
+      <cvename>CVE-2015-5133</cvename>
+      <cvename>CVE-2015-5134</cvename>
+      <cvename>CVE-2015-5539</cvename>
+      <cvename>CVE-2015-5540</cvename>
+      <cvename>CVE-2015-5541</cvename>
+      <cvename>CVE-2015-5544</cvename>
+      <cvename>CVE-2015-5545</cvename>
+      <cvename>CVE-2015-5546</cvename>
+      <cvename>CVE-2015-5547</cvename>
+      <cvename>CVE-2015-5548</cvename>
+      <cvename>CVE-2015-5549</cvename>
+      <cvename>CVE-2015-5550</cvename>
+      <cvename>CVE-2015-5551</cvename>
+      <cvename>CVE-2015-5552</cvename>
+      <cvename>CVE-2015-5553</cvename>
+      <cvename>CVE-2015-5554</cvename>
+      <cvename>CVE-2015-5555</cvename>
+      <cvename>CVE-2015-5556</cvename>
+      <cvename>CVE-2015-5557</cvename>
+      <cvename>CVE-2015-5558</cvename>
+      <cvename>CVE-2015-5559</cvename>
+      <cvename>CVE-2015-5560</cvename>
+      <cvename>CVE-2015-5561</cvename>
+      <cvename>CVE-2015-5562</cvename>
+      <cvename>CVE-2015-5563</cvename>
+      <cvename>CVE-2015-5564</cvename>
+      <url>https://helpx.adobe.com/security/products/flash-player/apsb15-19.html</url>;
+    </references>
+    <dates>
+      <discovery>2015-08-11</discovery>
+      <entry>2015-08-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="34e60332-2448-4ed6-93f0-12713749f250">
     <topic>libvpx -- multiple buffer overflows</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201508120731.t7C7VZfi098106>