Mailinglist Archive: opensuse-security-announce (37 mails)

< Previous Next >
[security-announce] openSUSE-SU-2015:0237-1: critical: Security update for flash-player
openSUSE Security Update: Security update for flash-player

Announcement ID: openSUSE-SU-2015:0237-1
Rating: critical
References: #915918
Cross-References: CVE-2015-0313 CVE-2015-0314 CVE-2015-0315
CVE-2015-0316 CVE-2015-0317 CVE-2015-0318
CVE-2015-0319 CVE-2015-0320 CVE-2015-0321
CVE-2015-0322 CVE-2015-0323 CVE-2015-0324
CVE-2015-0325 CVE-2015-0326 CVE-2015-0327
CVE-2015-0328 CVE-2015-0329 CVE-2015-0330

Affected Products:
openSUSE 13.2:NonFree
openSUSE 13.1:NonFree

An update that fixes 18 vulnerabilities is now available.


flash-player was updated to version to fix 18 security issues.

These security issues were fixed:
- Use-after-free vulnerabilities that could lead to code execution
(CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, CVE-2015-0322).
- Memory corruption vulnerabilities that could lead to code execution
(CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321,
CVE-2015-0329, CVE-2015-0330).
- Type confusion vulnerabilities that could lead to code execution
(CVE-2015-0317, CVE-2015-0319).
- Heap buffer overflow vulnerabilities that could lead to code execution
(CVE-2015-0323, CVE-2015-0327).
- Buffer overflow vulnerability that could lead to code execution
- Null pointer dereference issues (CVE-2015-0325, CVE-2015-0326,

More information is available at

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:NonFree:

zypper in -t patch openSUSE-2015-118=1

- openSUSE 13.1:NonFree:

zypper in -t patch openSUSE-2015-118=1

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 13.2:NonFree (i586 x86_64):


- openSUSE 13.1:NonFree (i586 x86_64):



To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages