Bug 162476 - www/linux-f10-flashplugin11 is vulnerable
www/linux-f10-flashplugin11 is vulnerable
Status: Closed FIXED
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s)
Latest
Any Any
: Normal Affects Only Me
Assigned To: emulation
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2011-11-11 14:20 UTC by turutani
Modified: 2011-11-12 15:40 UTC (History)
1 user (show)

See Also:


Attachments
file.diff (1.48 KB, patch)
2011-11-11 14:20 UTC, turutani
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description turutani 2011-11-11 14:20:01 UTC
	www/linux-f10-flashplugin11 is vulnerable.
	ref: http://www.adobe.com/support/security/bulletins/apsb11-28.html

Fix: new version of linux-f10-flashplugin11 is available.
	here is a patch to ports:
Comment 1 Edwin Groothuis freebsd_committer 2011-11-11 14:20:11 UTC
Responsible Changed
From-To: freebsd-ports-bugs->emulation

Over to maintainer (via the GNATS Auto Assign Tool)
Comment 2 dfilter freebsd_committer 2011-11-12 15:35:22 UTC
eadler      2011-11-12 15:35:14 UTC

  FreeBSD ports repository

  Modified files:
    www/linux-f10-flashplugin11 Makefile distinfo 
  Log:
  - update flash11 to 11.1r102.55
  
  PR:             ports/162476
  Submitted by:   Tsurutani Naoki <turutani@scphys.kyoto-u.ac.jp>
  Security:       CVE-2011-445, CVE-2011-2450, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2456, CVE-2011-2457, CVE-2011-2458, CVE-2011-2459, CVE-2011-2458
  Feature safe:   yes
  
  Revision  Changes    Path
  1.29      +3 -3      ports/www/linux-f10-flashplugin11/Makefile
  1.23      +4 -4      ports/www/linux-f10-flashplugin11/distinfo
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
Comment 3 Eitan Adler freebsd_committer 2011-11-12 15:38:40 UTC
State Changed
From-To: open->closed

Committed. Thanks!