From owner-svn-ports-all@FreeBSD.ORG Mon Mar 16 17:01:02 2015 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B588EE7D; Mon, 16 Mar 2015 17:01:02 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A055BC4; Mon, 16 Mar 2015 17:01:02 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t2GH12VT017149; Mon, 16 Mar 2015 17:01:02 GMT (envelope-from xmj@FreeBSD.org) Received: (from xmj@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t2GH12F5017146; Mon, 16 Mar 2015 17:01:02 GMT (envelope-from xmj@FreeBSD.org) Message-Id: <201503161701.t2GH12F5017146@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: xmj set sender to xmj@FreeBSD.org using -f From: Johannes Jost Meixner Date: Mon, 16 Mar 2015 17:01:02 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r381427 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Mar 2015 17:01:02 -0000 Author: xmj Date: Mon Mar 16 17:01:01 2015 New Revision: 381427 URL: https://svnweb.freebsd.org/changeset/ports/381427 QAT: https://qat.redports.org/buildarchive/r381427/ Log: Add latest security vulnerabilities in linux-*-flashplugin11: CVE-2015-0332 CVE-2015-0333 CVE-2015-0334 CVE-2015-0335 CVE-2015-0336 CVE-2015-0337 CVE-2015-0338 CVE-2015-0339 CVE-2015-0340 CVE-2015-0341 CVE-2015-0342 Differential Revision: https://reviews.freebsd.org/D2061 Approved by: swills (mentor) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Mar 16 17:00:05 2015 (r381426) +++ head/security/vuxml/vuln.xml Mon Mar 16 17:01:01 2015 (r381427) @@ -57,6 +57,64 @@ Notes: --> + + Adobe Flash Player -- critical vulnerabilities + + + linux-c6-flashplugin11 + 11.2r202.442 + + + linux-f10-flashplugin11 + 11.2r202.442 + + + + +

Adobe reports:

+
+

+ Adobe has released security updates for Adobe Flash Player for + Windows, Macintosh and Linux. These updates address vulnerabilities + that could potentially allow an attacker to take control of the + affected system. + These updates resolve memory corruption vulnerabilities that could + lead to code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, + CVE-2015-0339). + These updates resolve type confusion vulnerabilities that could lead + to code execution (CVE-2015-0334, CVE-2015-0336). + These updates resolve a vulnerability that could lead to a + cross-domain policy bypass (CVE-2015-0337). + These updates resolve a vulnerability that could lead to a file + upload restriction bypass (CVE-2015-0340). + These updates resolve an integer overflow vulnerability that could + lead to code execution (CVE-2015-0338). + These updates resolve use-after-free vulnerabilities that could lead + to code execution (CVE-2015-0341, CVE-2015-0342). +

+
+ +
+ + https://helpx.adobe.com/security/products/flash-player/apsb15-05.html + CVE-2015-0332 + CVE-2015-0333 + CVE-2015-0334 + CVE-2015-0335 + CVE-2015-0336 + CVE-2015-0337 + CVE-2015-0338 + CVE-2015-0339 + CVE-2015-0340 + CVE-2015-0341 + CVE-2015-0342 + + + 2015-03-12 + 2015-03-13 + +
+ sympa -- Remote attackers can read arbitrary files