Security update for flash-player
SUSE Security Update: Security update for flash-player
Announcement ID: | SUSE-SU-2016:0398-1 |
Rating: | important |
References: | #965901 |
Affected Products: |
An update that fixes 22 vulnerabilities is now available.
Description:
This update for flash-player fixes the following issues:
- Security update to 11.2.202.569 (bsc#965901):
* APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967,
CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0971,
CVE-2016-0972, CVE-2016-0973, CVE-2016-0974, CVE-2016-0975,
CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979,
CVE-2016-0980, CVE-2016-0981, CVE-2016-0982, CVE-2016-0983,
CVE-2016-0984, CVE-2016-0985
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Workstation Extension 12-SP1:
zypper in -t patch SUSE-SLE-WE-12-SP1-2016-235=1
- SUSE Linux Enterprise Workstation Extension 12:
zypper in -t patch SUSE-SLE-WE-12-2016-235=1
- SUSE Linux Enterprise Desktop 12-SP1:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-235=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2016-235=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):
- flash-player-11.2.202.569-120.1
- flash-player-gnome-11.2.202.569-120.1
- SUSE Linux Enterprise Workstation Extension 12 (x86_64):
- flash-player-11.2.202.569-120.1
- flash-player-gnome-11.2.202.569-120.1
- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):
- flash-player-11.2.202.569-120.1
- flash-player-gnome-11.2.202.569-120.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
- flash-player-11.2.202.569-120.1
- flash-player-gnome-11.2.202.569-120.1
References:
- https://www.suse.com/security/cve/CVE-2016-0964.html
- https://www.suse.com/security/cve/CVE-2016-0965.html
- https://www.suse.com/security/cve/CVE-2016-0966.html
- https://www.suse.com/security/cve/CVE-2016-0967.html
- https://www.suse.com/security/cve/CVE-2016-0968.html
- https://www.suse.com/security/cve/CVE-2016-0969.html
- https://www.suse.com/security/cve/CVE-2016-0970.html
- https://www.suse.com/security/cve/CVE-2016-0971.html
- https://www.suse.com/security/cve/CVE-2016-0972.html
- https://www.suse.com/security/cve/CVE-2016-0973.html
- https://www.suse.com/security/cve/CVE-2016-0974.html
- https://www.suse.com/security/cve/CVE-2016-0975.html
- https://www.suse.com/security/cve/CVE-2016-0976.html
- https://www.suse.com/security/cve/CVE-2016-0977.html
- https://www.suse.com/security/cve/CVE-2016-0978.html
- https://www.suse.com/security/cve/CVE-2016-0979.html
- https://www.suse.com/security/cve/CVE-2016-0980.html
- https://www.suse.com/security/cve/CVE-2016-0981.html
- https://www.suse.com/security/cve/CVE-2016-0982.html
- https://www.suse.com/security/cve/CVE-2016-0983.html
- https://www.suse.com/security/cve/CVE-2016-0984.html
- https://www.suse.com/security/cve/CVE-2016-0985.html
- https://bugzilla.suse.com/965901