diff options
author | kwm <kwm@FreeBSD.org> | 2015-07-14 16:39:50 +0800 |
---|---|---|
committer | kwm <kwm@FreeBSD.org> | 2015-07-14 16:39:50 +0800 |
commit | da5e30419a03a348acde8bd34ad5edbbb2919361 (patch) | |
tree | 84d207dcd4034379937ce279ee8ee4b6afd26920 /security/vuxml | |
parent | 090fe244a8d3e6ebea47e5556ade6e7994a87a82 (diff) | |
download | freebsd-ports-gnome-da5e30419a03a348acde8bd34ad5edbbb2919361.tar.gz freebsd-ports-gnome-da5e30419a03a348acde8bd34ad5edbbb2919361.tar.zst freebsd-ports-gnome-da5e30419a03a348acde8bd34ad5edbbb2919361.zip |
Add newest flash vulnerabilities CVE-2015-5122 and CVE-2015-5123.
No fixed version of flash available yet.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 79e2471d924b..791549ff73e5 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,41 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="8d2d6bbd-2a02-11e5-a0af-bcaec565249c"> + <topic>Adobe Flash Player -- critical vulnerabilities</topic> + <affects> + <package> + <name>linux-c6-flashplugin11</name> + <range><lt>0</lt></range> + </package> + <package> + <name>linux-f10-flashplugin11</name> + <range><lt>0</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Adobe reports:</p> + <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsa15-04.html"> + <p>Critical vulnerabilities (CVE-2015-5122, CVE-2015-5123) have + been identified. Successful exploitation could cause a crash + and potentially allow an attacker to take control of the + affected system. Adobe is aware of reports that exploits + targeting these vulnerabilities have been published publicly.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-5122</cvename> + <cvename>CVE-2015-5123</cvename> + <url>https://helpx.adobe.com/security/products/flash-player/apsa15-04.html</url> + </references> + <dates> + <discovery>2015-07-10</discovery> + <entry>2015-07-14</entry> + </dates> + </vuln> + <vuln vid="3d39e927-29a2-11e5-86ff-14dae9d210b8"> <topic>php -- use-after-free vulnerability</topic> <affects> |