Security update for flash-player
Announcement ID: | SUSE-SU-2016:0398-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 22 vulnerabilities can now be installed.
Description:
This update for flash-player fixes the following issues:
- Security update to 11.2.202.569 (bsc#965901):
- APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982, CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP1
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-235=1
-
SUSE Linux Enterprise Desktop 12
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-235=1
-
SUSE Linux Enterprise Workstation Extension 12 SP1
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-235=1
-
SUSE Linux Enterprise Workstation Extension 12
zypper in -t patch SUSE-SLE-WE-12-2016-235=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP1 (nosrc x86_64)
- flash-player-11.2.202.569-120.1
-
SUSE Linux Enterprise Desktop 12 SP1 (x86_64)
- flash-player-gnome-11.2.202.569-120.1
-
SUSE Linux Enterprise Desktop 12 (nosrc x86_64)
- flash-player-11.2.202.569-120.1
-
SUSE Linux Enterprise Desktop 12 (x86_64)
- flash-player-gnome-11.2.202.569-120.1
-
SUSE Linux Enterprise Workstation Extension 12 SP1 (nosrc x86_64)
- flash-player-11.2.202.569-120.1
-
SUSE Linux Enterprise Workstation Extension 12 SP1 (x86_64)
- flash-player-gnome-11.2.202.569-120.1
-
SUSE Linux Enterprise Workstation Extension 12 (nosrc x86_64)
- flash-player-11.2.202.569-120.1
-
SUSE Linux Enterprise Workstation Extension 12 (x86_64)
- flash-player-gnome-11.2.202.569-120.1
References:
- https://www.suse.com/security/cve/CVE-2016-0964.html
- https://www.suse.com/security/cve/CVE-2016-0965.html
- https://www.suse.com/security/cve/CVE-2016-0966.html
- https://www.suse.com/security/cve/CVE-2016-0967.html
- https://www.suse.com/security/cve/CVE-2016-0968.html
- https://www.suse.com/security/cve/CVE-2016-0969.html
- https://www.suse.com/security/cve/CVE-2016-0970.html
- https://www.suse.com/security/cve/CVE-2016-0971.html
- https://www.suse.com/security/cve/CVE-2016-0972.html
- https://www.suse.com/security/cve/CVE-2016-0973.html
- https://www.suse.com/security/cve/CVE-2016-0974.html
- https://www.suse.com/security/cve/CVE-2016-0975.html
- https://www.suse.com/security/cve/CVE-2016-0976.html
- https://www.suse.com/security/cve/CVE-2016-0977.html
- https://www.suse.com/security/cve/CVE-2016-0978.html
- https://www.suse.com/security/cve/CVE-2016-0979.html
- https://www.suse.com/security/cve/CVE-2016-0980.html
- https://www.suse.com/security/cve/CVE-2016-0981.html
- https://www.suse.com/security/cve/CVE-2016-0982.html
- https://www.suse.com/security/cve/CVE-2016-0983.html
- https://www.suse.com/security/cve/CVE-2016-0984.html
- https://www.suse.com/security/cve/CVE-2016-0985.html
- https://bugzilla.suse.com/show_bug.cgi?id=965901