svn commit: r394007 - head/security/vuxml
Koop Mast
kwm at FreeBSD.org
Wed Aug 12 07:31:36 UTC 2015
Author: kwm
Date: Wed Aug 12 07:31:35 2015
New Revision: 394007
URL: https://svnweb.freebsd.org/changeset/ports/394007
Log:
Document newest flash vulnabilities.
Also list the c6_64 flash port.
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Aug 12 07:16:36 2015 (r394006)
+++ head/security/vuxml/vuln.xml Wed Aug 12 07:31:35 2015 (r394007)
@@ -58,6 +58,98 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f3778328-d288-4b39-86a4-65877331eaf7">
+ <topic>Adobe Flash Player -- critical vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-c6-flashplugin</name>
+ <name>linux-c6_64-flashplugin</name>
+ <range><lt>11.2r202.508</lt></range>
+ </package>
+ <package>
+ <name>linux-f10-flashplugin</name>
+ <range><lt>11.2r202.508</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb15-19.html">
+ <p>Adobe has released security updates for Adobe Flash Player.
+ These updates address critical vulnerabilities that could
+ potentially allow an attacker to take control of the affected
+ system.</p>
+ <p>These updates resolve type confusion vulnerabilities that could
+ lead to code execution (CVE-2015-5128, CVE-2015-5554,
+ CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).</p>
+ <p>These updates include further hardening to a mitigation
+ introduced in version 18.0.0.209 to defend against vector
+ length corruptions (CVE-2015-5125).</p>
+ <p>These updates resolve use-after-free vulnerabilities that could
+ lead to code execution (CVE-2015-5550, CVE-2015-5551,
+ CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134,
+ CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559,
+ CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124,
+ CVE-2015-5564).</p>
+ <p>These updates resolve heap buffer overflow vulnerabilities
+ that could lead to code execution (CVE-2015-5129,
+ CVE-2015-5541).</p>
+ <p>These updates resolve buffer overflow vulnerabilities that
+ could lead to code execution (CVE-2015-5131, CVE-2015-5132,
+ CVE-2015-5133).</p>
+ <p>These updates resolve memory corruption vulnerabilities that
+ could lead to code execution (CVE-2015-5544, CVE-2015-5545,
+ CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549,
+ CVE-2015-5552, CVE-2015-5553).</p>
+ <p>These updates resolve an integer overflow vulnerability that
+ could lead to code execution (CVE-2015-5560).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-3107</cvename>
+ <cvename>CVE-2015-5124</cvename>
+ <cvename>CVE-2015-5125</cvename>
+ <cvename>CVE-2015-5127</cvename>
+ <cvename>CVE-2015-5128</cvename>
+ <cvename>CVE-2015-5129</cvename>
+ <cvename>CVE-2015-5130</cvename>
+ <cvename>CVE-2015-5131</cvename>
+ <cvename>CVE-2015-5132</cvename>
+ <cvename>CVE-2015-5133</cvename>
+ <cvename>CVE-2015-5134</cvename>
+ <cvename>CVE-2015-5539</cvename>
+ <cvename>CVE-2015-5540</cvename>
+ <cvename>CVE-2015-5541</cvename>
+ <cvename>CVE-2015-5544</cvename>
+ <cvename>CVE-2015-5545</cvename>
+ <cvename>CVE-2015-5546</cvename>
+ <cvename>CVE-2015-5547</cvename>
+ <cvename>CVE-2015-5548</cvename>
+ <cvename>CVE-2015-5549</cvename>
+ <cvename>CVE-2015-5550</cvename>
+ <cvename>CVE-2015-5551</cvename>
+ <cvename>CVE-2015-5552</cvename>
+ <cvename>CVE-2015-5553</cvename>
+ <cvename>CVE-2015-5554</cvename>
+ <cvename>CVE-2015-5555</cvename>
+ <cvename>CVE-2015-5556</cvename>
+ <cvename>CVE-2015-5557</cvename>
+ <cvename>CVE-2015-5558</cvename>
+ <cvename>CVE-2015-5559</cvename>
+ <cvename>CVE-2015-5560</cvename>
+ <cvename>CVE-2015-5561</cvename>
+ <cvename>CVE-2015-5562</cvename>
+ <cvename>CVE-2015-5563</cvename>
+ <cvename>CVE-2015-5564</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb15-19.html</url>
+ </references>
+ <dates>
+ <discovery>2015-08-11</discovery>
+ <entry>2015-08-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="34e60332-2448-4ed6-93f0-12713749f250">
<topic>libvpx -- multiple buffer overflows</topic>
<affects>
More information about the svn-ports-all
mailing list