diff options
author | Juergen Lock <nox@FreeBSD.org> | 2011-09-22 20:47:10 +0000 |
---|---|---|
committer | Juergen Lock <nox@FreeBSD.org> | 2011-09-22 20:47:10 +0000 |
commit | 2a400db18a4c026670840300713d442720716c3c (patch) | |
tree | 8db1dedbed02d6c57b741294b5c74f46f68a09b5 /security | |
parent | Update to 2.6. (diff) |
- Update linux-f10-flashplugin to 10.3r183.10 . [1]
- Make gnome desktopfileutils dependency optional. [2]
PR: ports/160894 [1]
Submitted by: Garrett Cooper <yanegomi@gmail.com> [1]
Suggested by: Peter Jeremy <peterjeremy@acm.org> [2]
Security: http://www.freebsd.org/ports/portaudit/53e531a7-e559-11e0-b481-001b2134ef46.html
Notes
Notes:
svn path=/head/; revision=282197
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1d4b9e786354..5cb671e30a17 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,53 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="53e531a7-e559-11e0-b481-001b2134ef46"> + <topic>linux-flashplugin -- multiple vulnerabilities</topic> + <affects> + <package> + <name>linux-flashplugin</name> + <range><le>9.0r289</le></range> + </package> + <package> + <name>linux-f10-flashplugin</name> + <range><lt>10.3r183.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Adobe Product Security Incident Response Team reports:</p> + <blockquote cite="https://www.adobe.com/support/security/bulletins/apsb11-26.html"> + <p>Critical vulnerabilities have been identified in Adobe Flash + Player 10.3.183.7 and earlier versions for Windows, Macintosh, + Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier + versions for Android. These vulnerabilities could cause a crash + and potentially allow an attacker to take control of the + affected system.</p> + <p>There are reports that one of these vulnerabilities + (CVE-2011-2444) is being exploited in the wild in active + targeted attacks designed to trick the user into clicking on + a malicious link delivered in an email message. This universal + cross-site scripting issue could be used to take actions on a + user's behalf on any website or webmail provider if the user + visits a malicious website.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.adobe.com/support/security/bulletins/apsb11-26.html</url> + <cvename>CVE-2011-2426</cvename> + <cvename>CVE-2011-2427</cvename> + <cvename>CVE-2011-2428</cvename> + <cvename>CVE-2011-2429</cvename> + <cvename>CVE-2011-2430</cvename> + <cvename>CVE-2011-2444</cvename> + </references> + <dates> + <discovery>2011-06-06</discovery> + <entry>2011-09-22</entry> + </dates> + </vuln> + <vuln vid="e44fe906-df27-11e0-a333-001cc0a36e12"> <topic>phpmyadmin -- multiple XSS vulnerabilities</topic> <affects> |