aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorKoop Mast <kwm@FreeBSD.org>2015-08-12 07:31:35 +0000
committerKoop Mast <kwm@FreeBSD.org>2015-08-12 07:31:35 +0000
commitb38a24c9151fa84e3929ccad231dbcf03c26c6e9 (patch)
tree198fd511fb5e4d9ec0b911ce19b6bcf7c763c060 /security
parent83720319f262ec77a53810e4393e3d978584a693 (diff)
downloadports-b38a24c9151fa84e3929ccad231dbcf03c26c6e9.tar.gz
ports-b38a24c9151fa84e3929ccad231dbcf03c26c6e9.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml92
1 files changed, 92 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ebd74b1779e3..2552bd495576 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,98 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f3778328-d288-4b39-86a4-65877331eaf7">
+ <topic>Adobe Flash Player -- critical vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-c6-flashplugin</name>
+ <name>linux-c6_64-flashplugin</name>
+ <range><lt>11.2r202.508</lt></range>
+ </package>
+ <package>
+ <name>linux-f10-flashplugin</name>
+ <range><lt>11.2r202.508</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb15-19.html">
+ <p>Adobe has released security updates for Adobe Flash Player.
+ These updates address critical vulnerabilities that could
+ potentially allow an attacker to take control of the affected
+ system.</p>
+ <p>These updates resolve type confusion vulnerabilities that could
+ lead to code execution (CVE-2015-5128, CVE-2015-5554,
+ CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).</p>
+ <p>These updates include further hardening to a mitigation
+ introduced in version 18.0.0.209 to defend against vector
+ length corruptions (CVE-2015-5125).</p>
+ <p>These updates resolve use-after-free vulnerabilities that could
+ lead to code execution (CVE-2015-5550, CVE-2015-5551,
+ CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134,
+ CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559,
+ CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124,
+ CVE-2015-5564).</p>
+ <p>These updates resolve heap buffer overflow vulnerabilities
+ that could lead to code execution (CVE-2015-5129,
+ CVE-2015-5541).</p>
+ <p>These updates resolve buffer overflow vulnerabilities that
+ could lead to code execution (CVE-2015-5131, CVE-2015-5132,
+ CVE-2015-5133).</p>
+ <p>These updates resolve memory corruption vulnerabilities that
+ could lead to code execution (CVE-2015-5544, CVE-2015-5545,
+ CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549,
+ CVE-2015-5552, CVE-2015-5553).</p>
+ <p>These updates resolve an integer overflow vulnerability that
+ could lead to code execution (CVE-2015-5560).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-3107</cvename>
+ <cvename>CVE-2015-5124</cvename>
+ <cvename>CVE-2015-5125</cvename>
+ <cvename>CVE-2015-5127</cvename>
+ <cvename>CVE-2015-5128</cvename>
+ <cvename>CVE-2015-5129</cvename>
+ <cvename>CVE-2015-5130</cvename>
+ <cvename>CVE-2015-5131</cvename>
+ <cvename>CVE-2015-5132</cvename>
+ <cvename>CVE-2015-5133</cvename>
+ <cvename>CVE-2015-5134</cvename>
+ <cvename>CVE-2015-5539</cvename>
+ <cvename>CVE-2015-5540</cvename>
+ <cvename>CVE-2015-5541</cvename>
+ <cvename>CVE-2015-5544</cvename>
+ <cvename>CVE-2015-5545</cvename>
+ <cvename>CVE-2015-5546</cvename>
+ <cvename>CVE-2015-5547</cvename>
+ <cvename>CVE-2015-5548</cvename>
+ <cvename>CVE-2015-5549</cvename>
+ <cvename>CVE-2015-5550</cvename>
+ <cvename>CVE-2015-5551</cvename>
+ <cvename>CVE-2015-5552</cvename>
+ <cvename>CVE-2015-5553</cvename>
+ <cvename>CVE-2015-5554</cvename>
+ <cvename>CVE-2015-5555</cvename>
+ <cvename>CVE-2015-5556</cvename>
+ <cvename>CVE-2015-5557</cvename>
+ <cvename>CVE-2015-5558</cvename>
+ <cvename>CVE-2015-5559</cvename>
+ <cvename>CVE-2015-5560</cvename>
+ <cvename>CVE-2015-5561</cvename>
+ <cvename>CVE-2015-5562</cvename>
+ <cvename>CVE-2015-5563</cvename>
+ <cvename>CVE-2015-5564</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb15-19.html</url>
+ </references>
+ <dates>
+ <discovery>2015-08-11</discovery>
+ <entry>2015-08-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="34e60332-2448-4ed6-93f0-12713749f250">
<topic>libvpx -- multiple buffer overflows</topic>
<affects>