aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorKoop Mast <kwm@FreeBSD.org>2015-12-29 18:55:02 +0000
committerKoop Mast <kwm@FreeBSD.org>2015-12-29 18:55:02 +0000
commit8d99556d0be392f4b549aa6ccfe8c1a5d243f7a0 (patch)
tree95bd254fa61c0b7c923b816bae6ee9e47b5127a3 /security
parent0563d9264f8fdece6dc5669b0ec4b55a58130e30 (diff)
downloadports-8d99556d0be392f4b549aa6ccfe8c1a5d243f7a0.tar.gz
ports-8d99556d0be392f4b549aa6ccfe8c1a5d243f7a0.zip
Document latest flash vulnabilities.
Security: CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651
Notes
Notes: svn path=/head/; revision=404775
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml59
1 files changed, 59 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 52d5dc2d9f29..03af6265aee3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,65 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="84c7ea88-bf04-4bdc-973b-36744bf540ab">
+ <topic>flash -- multiple vulnabilities</topic>
+ <affects>
+ <package>
+ <name>linux-c6-flashplugin</name>
+ <name>linux-f10-flashplugin</name>
+ <name>linux-c6_64-flashplugin</name>
+ <range><lt>11.2r202.559</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb16-01.html">
+ <p>These updates resolve a type confusion vulnerability that
+ could lead to code execution (CVE-2015-8644).</p>
+
+ <p>These updates resolve an integer overflow vulnerability
+ that could lead to code execution (CVE-2015-8651).</p>
+
+ <p>These updates resolve use-after-free vulnerabilities that
+ could lead to code execution (CVE-2015-8634, CVE-2015-8635,
+ CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641,
+ CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647,
+ CVE-2015-8648, CVE-2015-8649, CVE-2015-8650).</p>
+
+ <p>These updates resolve memory corruption vulnerabilities
+ that could lead to code execution (CVE-2015-8459,
+ CVE-2015-8460, CVE-2015-8636, CVE-2015-8645).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-8459</cvename>
+ <cvename>CVE-2015-8460</cvename>
+ <cvename>CVE-2015-8634</cvename>
+ <cvename>CVE-2015-8636</cvename>
+ <cvename>CVE-2015-8638</cvename>
+ <cvename>CVE-2015-8639</cvename>
+ <cvename>CVE-2015-8640</cvename>
+ <cvename>CVE-2015-8641</cvename>
+ <cvename>CVE-2015-8642</cvename>
+ <cvename>CVE-2015-8643</cvename>
+ <cvename>CVE-2015-8644</cvename>
+ <cvename>CVE-2015-8645</cvename>
+ <cvename>CVE-2015-8646</cvename>
+ <cvename>CVE-2015-8647</cvename>
+ <cvename>CVE-2015-8648</cvename>
+ <cvename>CVE-2015-8649</cvename>
+ <cvename>CVE-2015-8650</cvename>
+ <cvename>CVE-2015-8651</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb16-01.html</url>
+ </references>
+ <dates>
+ <discovery>2015-12-28</discovery>
+ <entry>2015-12-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b808c3a8-ae30-11e5-b864-14dae9d210b8">
<topic>inspircd -- DoS</topic>
<affects>