diff options
author | Koop Mast <kwm@FreeBSD.org> | 2015-08-12 07:31:35 +0000 |
---|---|---|
committer | Koop Mast <kwm@FreeBSD.org> | 2015-08-12 07:31:35 +0000 |
commit | b38a24c9151fa84e3929ccad231dbcf03c26c6e9 (patch) | |
tree | 198fd511fb5e4d9ec0b911ce19b6bcf7c763c060 /security | |
parent | 83720319f262ec77a53810e4393e3d978584a693 (diff) | |
download | ports-b38a24c9151fa84e3929ccad231dbcf03c26c6e9.tar.gz ports-b38a24c9151fa84e3929ccad231dbcf03c26c6e9.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 92 |
1 files changed, 92 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ebd74b1779e3..2552bd495576 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,98 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="f3778328-d288-4b39-86a4-65877331eaf7"> + <topic>Adobe Flash Player -- critical vulnerabilities</topic> + <affects> + <package> + <name>linux-c6-flashplugin</name> + <name>linux-c6_64-flashplugin</name> + <range><lt>11.2r202.508</lt></range> + </package> + <package> + <name>linux-f10-flashplugin</name> + <range><lt>11.2r202.508</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Adobe reports:</p> + <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb15-19.html"> + <p>Adobe has released security updates for Adobe Flash Player. + These updates address critical vulnerabilities that could + potentially allow an attacker to take control of the affected + system.</p> + <p>These updates resolve type confusion vulnerabilities that could + lead to code execution (CVE-2015-5128, CVE-2015-5554, + CVE-2015-5555, CVE-2015-5558, CVE-2015-5562).</p> + <p>These updates include further hardening to a mitigation + introduced in version 18.0.0.209 to defend against vector + length corruptions (CVE-2015-5125).</p> + <p>These updates resolve use-after-free vulnerabilities that could + lead to code execution (CVE-2015-5550, CVE-2015-5551, + CVE-2015-3107, CVE-2015-5556, CVE-2015-5130, CVE-2015-5134, + CVE-2015-5539, CVE-2015-5540, CVE-2015-5557, CVE-2015-5559, + CVE-2015-5127, CVE-2015-5563, CVE-2015-5561, CVE-2015-5124, + CVE-2015-5564).</p> + <p>These updates resolve heap buffer overflow vulnerabilities + that could lead to code execution (CVE-2015-5129, + CVE-2015-5541).</p> + <p>These updates resolve buffer overflow vulnerabilities that + could lead to code execution (CVE-2015-5131, CVE-2015-5132, + CVE-2015-5133).</p> + <p>These updates resolve memory corruption vulnerabilities that + could lead to code execution (CVE-2015-5544, CVE-2015-5545, + CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, + CVE-2015-5552, CVE-2015-5553).</p> + <p>These updates resolve an integer overflow vulnerability that + could lead to code execution (CVE-2015-5560).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-3107</cvename> + <cvename>CVE-2015-5124</cvename> + <cvename>CVE-2015-5125</cvename> + <cvename>CVE-2015-5127</cvename> + <cvename>CVE-2015-5128</cvename> + <cvename>CVE-2015-5129</cvename> + <cvename>CVE-2015-5130</cvename> + <cvename>CVE-2015-5131</cvename> + <cvename>CVE-2015-5132</cvename> + <cvename>CVE-2015-5133</cvename> + <cvename>CVE-2015-5134</cvename> + <cvename>CVE-2015-5539</cvename> + <cvename>CVE-2015-5540</cvename> + <cvename>CVE-2015-5541</cvename> + <cvename>CVE-2015-5544</cvename> + <cvename>CVE-2015-5545</cvename> + <cvename>CVE-2015-5546</cvename> + <cvename>CVE-2015-5547</cvename> + <cvename>CVE-2015-5548</cvename> + <cvename>CVE-2015-5549</cvename> + <cvename>CVE-2015-5550</cvename> + <cvename>CVE-2015-5551</cvename> + <cvename>CVE-2015-5552</cvename> + <cvename>CVE-2015-5553</cvename> + <cvename>CVE-2015-5554</cvename> + <cvename>CVE-2015-5555</cvename> + <cvename>CVE-2015-5556</cvename> + <cvename>CVE-2015-5557</cvename> + <cvename>CVE-2015-5558</cvename> + <cvename>CVE-2015-5559</cvename> + <cvename>CVE-2015-5560</cvename> + <cvename>CVE-2015-5561</cvename> + <cvename>CVE-2015-5562</cvename> + <cvename>CVE-2015-5563</cvename> + <cvename>CVE-2015-5564</cvename> + <url>https://helpx.adobe.com/security/products/flash-player/apsb15-19.html</url> + </references> + <dates> + <discovery>2015-08-11</discovery> + <entry>2015-08-12</entry> + </dates> + </vuln> + <vuln vid="34e60332-2448-4ed6-93f0-12713749f250"> <topic>libvpx -- multiple buffer overflows</topic> <affects> |