Date: Wed, 12 Aug 2015 07:31:35 +0000 (UTC) From: Koop Mast <kwm@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r394007 - head/security/vuxml Message-ID: <201508120731.t7C7VZfi098106@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: kwm Date: Wed Aug 12 07:31:35 2015 New Revision: 394007 URL: https://svnweb.freebsd.org/changeset/ports/394007 Log: Document newest flash vulnabilities. Also list the c6_64 flash port. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Aug 12 07:16:36 2015 (r394006) +++ head/security/vuxml/vuln.xml Wed Aug 12 07:31:35 2015 (r394007) @@ -58,6 +58,98 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f3778328-d288-4b39-86a4-65877331eaf7"> + <topic>Adobe Flash Player -- critical vulnerabilities</topic> + <affects> + <package> + <name>linux-c6-flashplugin</name> + <name>linux-c6_64-flashplugin</name> + <range><lt>11.2r202.508</lt></range> + </package> + <package> + <name>linux-f10-flashplugin</name> + <range><lt>11.2r202.508</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Adobe reports:</p> + <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"> + <p>Adobe has released security updates for Adobe Flash Player. + These updates address critical vulnerabilities that could + potentially allow an attacker to take control of the affected + system.</p> + <p>These updates resolve type confusion vulnerabilities that could + lead to code execution (CVE-2015-5128, CVE-2015-5554, + CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).</p> + <p>These updates include further hardening to a mitigation + introduced in version 18.0.0.209 to defend against vector + length corruptions (CVE-2015-5125).</p> + <p>These updates resolve use-after-free vulnerabilities that could + lead to code execution (CVE-2015-5550, CVE-2015-5551, + CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134, + CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559, + CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124, + CVE-2015-5564).</p> + <p>These updates resolve heap buffer overflow vulnerabilities + that could lead to code execution (CVE-2015-5129, + CVE-2015-5541).</p> + <p>These updates resolve buffer overflow vulnerabilities that + could lead to code execution (CVE-2015-5131, CVE-2015-5132, + CVE-2015-5133).</p> + <p>These updates resolve memory corruption vulnerabilities that + could lead to code execution (CVE-2015-5544, CVE-2015-5545, + CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, + CVE-2015-5552, CVE-2015-5553).</p> + <p>These updates resolve an integer overflow vulnerability that + could lead to code execution (CVE-2015-5560).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-3107</cvename> + <cvename>CVE-2015-5124</cvename> + <cvename>CVE-2015-5125</cvename> + <cvename>CVE-2015-5127</cvename> + <cvename>CVE-2015-5128</cvename> + <cvename>CVE-2015-5129</cvename> + <cvename>CVE-2015-5130</cvename> + <cvename>CVE-2015-5131</cvename> + <cvename>CVE-2015-5132</cvename> + <cvename>CVE-2015-5133</cvename> + <cvename>CVE-2015-5134</cvename> + <cvename>CVE-2015-5539</cvename> + <cvename>CVE-2015-5540</cvename> + <cvename>CVE-2015-5541</cvename> + <cvename>CVE-2015-5544</cvename> + <cvename>CVE-2015-5545</cvename> + <cvename>CVE-2015-5546</cvename> + <cvename>CVE-2015-5547</cvename> + <cvename>CVE-2015-5548</cvename> + <cvename>CVE-2015-5549</cvename> + <cvename>CVE-2015-5550</cvename> + <cvename>CVE-2015-5551</cvename> + <cvename>CVE-2015-5552</cvename> + <cvename>CVE-2015-5553</cvename> + <cvename>CVE-2015-5554</cvename> + <cvename>CVE-2015-5555</cvename> + <cvename>CVE-2015-5556</cvename> + <cvename>CVE-2015-5557</cvename> + <cvename>CVE-2015-5558</cvename> + <cvename>CVE-2015-5559</cvename> + <cvename>CVE-2015-5560</cvename> + <cvename>CVE-2015-5561</cvename> + <cvename>CVE-2015-5562</cvename> + <cvename>CVE-2015-5563</cvename> + <cvename>CVE-2015-5564</cvename> + <url>https://helpx.adobe.com/security/products/flash-player/apsb15-19.html</url> + </references> + <dates> + <discovery>2015-08-11</discovery> + <entry>2015-08-12</entry> + </dates> + </vuln> + <vuln vid="34e60332-2448-4ed6-93f0-12713749f250"> <topic>libvpx -- multiple buffer overflows</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201508120731.t7C7VZfi098106>