summaryrefslogtreecommitdiff
path: root/multimedia/adobe-flash-plugin11
diff options
context:
space:
mode:
authorabs <abs@pkgsrc.org>2011-11-12 22:01:48 +0000
committerabs <abs@pkgsrc.org>2011-11-12 22:01:48 +0000
commit15f784dd43d19022d317f086ddb445340adc1621 (patch)
treee8d86b2795458f92357e21135510f88806dce21b /multimedia/adobe-flash-plugin11
parent3817df5673b7b9a57fd9e83321efa7b6bc7566d0 (diff)
downloadpkgsrc-15f784dd43d19022d317f086ddb445340adc1621.tar.gz
Updated multimedia/adobe-flash-plugin11 to 11.1.102.55
Changes from 11.0.1.152 Critical vulnerabilities have been identified in Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 11.0.1.153 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445). This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456). This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457). This update resolves a vulnerability that could lead to a cross-domain policy bypass (Internet Explorer-only) (CVE-2011-2458). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460). ... now after reading the above, just how happy are people running this code from their browsers?
Diffstat (limited to 'multimedia/adobe-flash-plugin11')
-rw-r--r--multimedia/adobe-flash-plugin11/Makefile6
-rw-r--r--multimedia/adobe-flash-plugin11/distinfo8
2 files changed, 7 insertions, 7 deletions
diff --git a/multimedia/adobe-flash-plugin11/Makefile b/multimedia/adobe-flash-plugin11/Makefile
index 6b8e7751482..21ea9eddd10 100644
--- a/multimedia/adobe-flash-plugin11/Makefile
+++ b/multimedia/adobe-flash-plugin11/Makefile
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.1.1.1 2011/11/03 18:14:14 abs Exp $
+# $NetBSD: Makefile,v 1.2 2011/11/12 22:01:48 abs Exp $
DISTNAME= flash-plugin-${FLASH_VERSION}-release.${FLASH_ARCH}
PKGNAME= adobe-${DISTNAME:C/-release.*//}
CATEGORIES= multimedia www
-MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/current/
+MASTER_SITES= http://fpdownload.macromedia.com/get/flashplayer/pdc/${FLASH_VERSION}/
MAINTAINER= pkgsrc-users@NetBSD.org
HOMEPAGE= http://www.adobe.com/products/flashplayer.html
@@ -32,7 +32,7 @@ EMUL_PLATFORMS= linux-i386 #linux-x86_64
EMUL_MODULES.linux= gtk2 x11 krb5 alsa curl
EMUL_REQD= suse>=11.3
-FLASH_VERSION= 11.0.1.152
+FLASH_VERSION= 11.1.102.55
.include "../../mk/bsd.prefs.mk"
diff --git a/multimedia/adobe-flash-plugin11/distinfo b/multimedia/adobe-flash-plugin11/distinfo
index bd6f0187aee..35fc2ecc8fa 100644
--- a/multimedia/adobe-flash-plugin11/distinfo
+++ b/multimedia/adobe-flash-plugin11/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.1.1.1 2011/11/03 18:14:14 abs Exp $
+$NetBSD: distinfo,v 1.2 2011/11/12 22:01:48 abs Exp $
-SHA1 (flash-plugin-11.0.1.152-release.i386.rpm) = 696e2a0ec53562bbad1b7f6af8358454eb591fc1
-RMD160 (flash-plugin-11.0.1.152-release.i386.rpm) = 4173da9f78bfb501ed7c16910f5f9e9947a48a21
-Size (flash-plugin-11.0.1.152-release.i386.rpm) = 6729680 bytes
+SHA1 (flash-plugin-11.1.102.55-release.i386.rpm) = 6e837e30e8bac2b02738476179d6b4c67e49919d
+RMD160 (flash-plugin-11.1.102.55-release.i386.rpm) = 6279dd624579a0eaaeabe66fe976b6b580728fe8
+Size (flash-plugin-11.1.102.55-release.i386.rpm) = 6733489 bytes