Security update for flash-player
Announcement ID: | SUSE-SU-2016:0716-1 |
---|---|
Rating: | important |
References: | |
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 23 vulnerabilities can now be installed.
Description:
Adobe flash-player was updated to 11.2.202.577 to fix the following list of security issues (bsc#970547):
These updates resolve integer overflow vulnerabilities that could lead to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).
These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).
These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2016-1001).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, CVE-2016-1005).
Adobe advisory with more information: https://helpx.adobe.com/security/products/flash-player/apsb16-08.html
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 11 SP4
zypper in -t patch sledsp4-flash-player-12443=1
Package List:
-
SUSE Linux Enterprise Desktop 11 SP4 (nosrc x86_64 i586)
- flash-player-11.2.202.577-0.38.1
-
SUSE Linux Enterprise Desktop 11 SP4 (x86_64 i586)
- flash-player-gnome-11.2.202.577-0.38.1
- flash-player-kde4-11.2.202.577-0.38.1
References:
- https://www.suse.com/security/cve/CVE-2016-0960.html
- https://www.suse.com/security/cve/CVE-2016-0961.html
- https://www.suse.com/security/cve/CVE-2016-0962.html
- https://www.suse.com/security/cve/CVE-2016-0963.html
- https://www.suse.com/security/cve/CVE-2016-0986.html
- https://www.suse.com/security/cve/CVE-2016-0987.html
- https://www.suse.com/security/cve/CVE-2016-0988.html
- https://www.suse.com/security/cve/CVE-2016-0989.html
- https://www.suse.com/security/cve/CVE-2016-0990.html
- https://www.suse.com/security/cve/CVE-2016-0991.html
- https://www.suse.com/security/cve/CVE-2016-0992.html
- https://www.suse.com/security/cve/CVE-2016-0993.html
- https://www.suse.com/security/cve/CVE-2016-0994.html
- https://www.suse.com/security/cve/CVE-2016-0995.html
- https://www.suse.com/security/cve/CVE-2016-0996.html
- https://www.suse.com/security/cve/CVE-2016-0997.html
- https://www.suse.com/security/cve/CVE-2016-0998.html
- https://www.suse.com/security/cve/CVE-2016-0999.html
- https://www.suse.com/security/cve/CVE-2016-1000.html
- https://www.suse.com/security/cve/CVE-2016-1001.html
- https://www.suse.com/security/cve/CVE-2016-1002.html
- https://www.suse.com/security/cve/CVE-2016-1005.html
- https://www.suse.com/security/cve/CVE-2016-1010.html
- https://bugzilla.suse.com/show_bug.cgi?id=970547