diff options
author | abs <abs@pkgsrc.org> | 2011-11-12 22:02:24 +0000 |
---|---|---|
committer | abs <abs@pkgsrc.org> | 2011-11-12 22:02:24 +0000 |
commit | 1b2dc989b0c0c845d555c95d188920d993111b4c (patch) | |
tree | 45c0d5b0716b52b79b2a82142b5004723c064781 /multimedia/adobe-flash-plugin10.1 | |
parent | 15f784dd43d19022d317f086ddb445340adc1621 (diff) | |
download | pkgsrc-1b2dc989b0c0c845d555c95d188920d993111b4c.tar.gz |
Updated multimedia/adobe-flash-plugin10.1 to 10.3.183.11
Changes from 10.3.183.7
Critical vulnerabilities have been identified in Adobe Flash Player
11.0.1.152 and earlier versions for Windows, Macintosh, Linux and
Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions
for Android. These vulnerabilities could cause a crash and potentially
allow an attacker to take control of the affected system.
Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier
versions for Windows, Macintosh, Linux and Solaris update to Adobe
Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153
and earlier versions for Android should update to Adobe Flash Player
11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows,
Macintosh, and Android should update to Adobe AIR 3.1.0.4880.
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445).
This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455).
This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456).
This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457).
This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459).
This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460).
... now after reading the above, just how happy are people running this code
from their browsers?
Diffstat (limited to 'multimedia/adobe-flash-plugin10.1')
-rw-r--r-- | multimedia/adobe-flash-plugin10.1/Makefile | 7 | ||||
-rw-r--r-- | multimedia/adobe-flash-plugin10.1/distinfo | 8 |
2 files changed, 7 insertions, 8 deletions
diff --git a/multimedia/adobe-flash-plugin10.1/Makefile b/multimedia/adobe-flash-plugin10.1/Makefile index 0654a893d43..86eb2fb7171 100644 --- a/multimedia/adobe-flash-plugin10.1/Makefile +++ b/multimedia/adobe-flash-plugin10.1/Makefile @@ -1,10 +1,9 @@ -# $NetBSD: Makefile,v 1.14 2011/11/03 18:16:51 abs Exp $ +# $NetBSD: Makefile,v 1.15 2011/11/12 22:02:24 abs Exp $ DISTNAME= flash-plugin-${FLASH_VERSION}-release.i386 PKGNAME= adobe-${DISTNAME:C/-release.*//} -PKGREVISION= 5 CATEGORIES= multimedia www -MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/current/ +MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/pdc/${FLASH_VERSION}/ MAINTAINER= pkgsrc-users@NetBSD.org HOMEPAGE= http://www.adobe.com/products/flashplayer.html @@ -31,7 +30,7 @@ EMUL_PLATFORMS= linux-i386 EMUL_MODULES.linux= gtk2 x11 krb5 alsa curl EMUL_REQD= suse>=11.3 -FLASH_VERSION= 10.3.183.7 +FLASH_VERSION= 10.3.183.11 CONFLICTS= ns-flash-[0-9]* diff --git a/multimedia/adobe-flash-plugin10.1/distinfo b/multimedia/adobe-flash-plugin10.1/distinfo index b0433c3460c..be925120add 100644 --- a/multimedia/adobe-flash-plugin10.1/distinfo +++ b/multimedia/adobe-flash-plugin10.1/distinfo @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.6 2011/09/04 19:50:04 tnn Exp $ +$NetBSD: distinfo,v 1.7 2011/11/12 22:02:24 abs Exp $ -SHA1 (flash-plugin-10.3.183.7-release.i386.rpm) = 7ad5f80e8d2a94773645948d54d5350c4745f9c4 -RMD160 (flash-plugin-10.3.183.7-release.i386.rpm) = 914484cb463eae2c0fb81237be77a695bd36e1b1 -Size (flash-plugin-10.3.183.7-release.i386.rpm) = 5450066 bytes +SHA1 (flash-plugin-10.3.183.11-release.i386.rpm) = c62d921373d8cd8ffa25632cf749b14f0baddb4c +RMD160 (flash-plugin-10.3.183.11-release.i386.rpm) = 9427c796b30b131a6bf3dff914d5c17861f245b0 +Size (flash-plugin-10.3.183.11-release.i386.rpm) = 5450222 bytes |