summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5370805fc3d0..9ac7ca1f2fd6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,40 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="de6d01d5-9c44-11e6-ba67-0011d823eebd">
+ <topic>flash -- remote code execution</topic>
+ <affects>
+ <package>
+ <name>linux-f10-flashplugin</name>
+ <name>linux-c6-flashplugin</name>
+ <name>linux-c7-flashplugin</name>
+ <range><lt>11.2r202.643</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb16-36.html">
+ <p>Adobe has released security updates for Adobe Flash Player for
+ Windows, Macintosh, Linux and Chrome OS. These updates address a
+ critical vulnerability that could potentially allow an attacker to
+ take control of the affected system.</p>
+ <p>Adobe is aware of a report that an exploit for CVE-2016-7855
+ exists in the wild, and is being used in limited, targeted attacks
+ against users running Windows versions 7, 8.1 and 10.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-7855</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb16-36.html</url>
+ </references>
+ <dates>
+ <discovery>2016-10-26</discovery>
+ <entry>2016-10-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a479a725-9adb-11e6-a298-14dae9d210b8">
<topic>FreeBSD -- bhyve - privilege escalation vulnerability</topic>
<affects>