summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorsbd <sbd@pkgsrc.org>2011-11-13 02:01:28 +0000
committersbd <sbd@pkgsrc.org>2011-11-13 02:01:28 +0000
commit8eed357e793a12d5360252755780061fe5139285 (patch)
tree16afa82449736f7bfc154c17410ed4b12fa61ad4
parent795b9a7d401ff0c3c4567d3158b241e5946787d0 (diff)
downloadpkgsrc-8eed357e793a12d5360252755780061fe5139285.tar.gz
Pullup ticket #3600 - requested by abs
multimedia/adobe-flash-plugin10.1 security update Revisions pulled up: - multimedia/adobe-flash-plugin10.1/Makefile 1.15 - multimedia/adobe-flash-plugin10.1/distinfo 1.7 --- Module Name:    pkgsrc Committed By:   abs Date:           Sat Nov 12 22:02:24 UTC 2011 Modified Files:        pkgsrc/multimedia/adobe-flash-plugin10.1: Makefile distinfo Log Message: Updated multimedia/adobe-flash-plugin10.1 to 10.3.183.11 Changes from 10.3.183.7 Critical vulnerabilities have been identified in Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445). This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456). This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457). This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460). ... now after reading the above, just how happy are people running this code from their browsers?
-rw-r--r--multimedia/adobe-flash-plugin10.1/Makefile11
-rw-r--r--multimedia/adobe-flash-plugin10.1/distinfo8
2 files changed, 9 insertions, 10 deletions
diff --git a/multimedia/adobe-flash-plugin10.1/Makefile b/multimedia/adobe-flash-plugin10.1/Makefile
index c9b12a12876..cd4ec51135c 100644
--- a/multimedia/adobe-flash-plugin10.1/Makefile
+++ b/multimedia/adobe-flash-plugin10.1/Makefile
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.10 2011/09/12 23:35:15 abs Exp $
+# $NetBSD: Makefile,v 1.10.2.1 2011/11/13 02:01:28 sbd Exp $
-PKGNAME= adobe-flash-plugin-${FLASH_VERSION:S/r/./}
-PKGREVISION= 1
+DISTNAME= flash-plugin-${FLASH_VERSION}-release.i386
+PKGNAME= adobe-${DISTNAME:C/-release.*//}
CATEGORIES= multimedia www
-MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/current/
+MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/pdc/${FLASH_VERSION}/
MAINTAINER= pkgsrc-users@NetBSD.org
HOMEPAGE= http://www.adobe.com/
@@ -30,8 +30,7 @@ EMUL_PLATFORMS= linux-i386
EMUL_MODULES.linux= gtk2 x11 krb5 alsa curl
EMUL_REQD= suse>=11.3
-FLASH_VERSION= 10.3.183.7
-DISTNAME= flash-plugin-${FLASH_VERSION}-release.i386
+FLASH_VERSION= 10.3.183.11
CONFLICTS= ns-flash-[0-9]*
diff --git a/multimedia/adobe-flash-plugin10.1/distinfo b/multimedia/adobe-flash-plugin10.1/distinfo
index b0433c3460c..381ef7d10a8 100644
--- a/multimedia/adobe-flash-plugin10.1/distinfo
+++ b/multimedia/adobe-flash-plugin10.1/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.6 2011/09/04 19:50:04 tnn Exp $
+$NetBSD: distinfo,v 1.6.2.1 2011/11/13 02:01:28 sbd Exp $
-SHA1 (flash-plugin-10.3.183.7-release.i386.rpm) = 7ad5f80e8d2a94773645948d54d5350c4745f9c4
-RMD160 (flash-plugin-10.3.183.7-release.i386.rpm) = 914484cb463eae2c0fb81237be77a695bd36e1b1
-Size (flash-plugin-10.3.183.7-release.i386.rpm) = 5450066 bytes
+SHA1 (flash-plugin-10.3.183.11-release.i386.rpm) = c62d921373d8cd8ffa25632cf749b14f0baddb4c
+RMD160 (flash-plugin-10.3.183.11-release.i386.rpm) = 9427c796b30b131a6bf3dff914d5c17861f245b0
+Size (flash-plugin-10.3.183.11-release.i386.rpm) = 5450222 bytes