Mailinglist Archive: opensuse-security-announce (37 mails)

< Previous Next >
[security-announce] SUSE-SU-2015:0239-1: critical: Security update for flash-player, flash-player-gnome, flash-player-kde4
SUSE Security Update: Security update for flash-player, flash-player-gnome,
flash-player-kde4
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0239-1
Rating: critical
References: #915918
Cross-References: CVE-2015-0313 CVE-2015-0314 CVE-2015-0315
CVE-2015-0316 CVE-2015-0317 CVE-2015-0318
CVE-2015-0319 CVE-2015-0320 CVE-2015-0321
CVE-2015-0322 CVE-2015-0323 CVE-2015-0324
CVE-2015-0325 CVE-2015-0326 CVE-2015-0327
CVE-2015-0328 CVE-2015-0329 CVE-2015-0330

Affected Products:
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

An update that fixes 18 vulnerabilities is now available.
It includes one version update.

Description:


flash-player was updated to version 11.2.202.442 to fix 18 security issues.

These security issues were fixed: - Use-after-free vulnerabilities that
could lead to code execution (CVE-2015-0313, CVE-2015-0315, CVE-2015-0320,
CVE-2015-0322). - Memory corruption vulnerabilities that could lead to
code execution (CVE-2015-0314, CVE-2015-0316, CVE-2015-0318,
CVE-2015-0321, CVE-2015-0329, CVE-2015-0330). - Type confusion
vulnerabilities that could lead to code execution (CVE-2015-0317,
CVE-2015-0319). - Heap buffer
overflow vulnerabilities that could lead to code execution (CVE-2015-0323,
CVE-2015-0327). - Buffer overflow vulnerability that could lead to code
execution (CVE-2015-0324). - Null pointer dereference issues
(CVE-2015-0325, CVE-2015-0326, CVE-2015-0328).

More information is available at
https://helpx.adobe.com/security/products/flash-player/apsb15-04.html

Security Issues:

* CVE-2015-0313
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0313>
* CVE-2015-0314
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0314>
* CVE-2015-0315
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0315>
* CVE-2015-0316
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0316>
* CVE-2015-0317
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0317>
* CVE-2015-0318
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318>
* CVE-2015-0319
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0319>
* CVE-2015-0320
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0320>
* CVE-2015-0321
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0321>
* CVE-2015-0322
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0322>
* CVE-2015-0323
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0323>
* CVE-2015-0324
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0324>
* CVE-2015-0325
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0325>
* CVE-2015-0326
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0326>
* CVE-2015-0327
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0327>
* CVE-2015-0328
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0328>
* CVE-2015-0329
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0329>
* CVE-2015-0330
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0330>

Contraindications:



Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Desktop 11 SP3:

zypper in -t patch sledsp3-flash-player=10287

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version:
11.2.202.442]:

flash-player-11.2.202.442-0.3.1
flash-player-gnome-11.2.202.442-0.3.1
flash-player-kde4-11.2.202.442-0.3.1


References:

http://support.novell.com/security/cve/CVE-2015-0313.html
http://support.novell.com/security/cve/CVE-2015-0314.html
http://support.novell.com/security/cve/CVE-2015-0315.html
http://support.novell.com/security/cve/CVE-2015-0316.html
http://support.novell.com/security/cve/CVE-2015-0317.html
http://support.novell.com/security/cve/CVE-2015-0318.html
http://support.novell.com/security/cve/CVE-2015-0319.html
http://support.novell.com/security/cve/CVE-2015-0320.html
http://support.novell.com/security/cve/CVE-2015-0321.html
http://support.novell.com/security/cve/CVE-2015-0322.html
http://support.novell.com/security/cve/CVE-2015-0323.html
http://support.novell.com/security/cve/CVE-2015-0324.html
http://support.novell.com/security/cve/CVE-2015-0325.html
http://support.novell.com/security/cve/CVE-2015-0326.html
http://support.novell.com/security/cve/CVE-2015-0327.html
http://support.novell.com/security/cve/CVE-2015-0328.html
http://support.novell.com/security/cve/CVE-2015-0329.html
http://support.novell.com/security/cve/CVE-2015-0330.html
https://bugzilla.suse.com/show_bug.cgi?id=915918

http://download.suse.com/patch/finder/?keywords=7fb4ff1fae894ac722cc8e70ad37954c

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages