Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Flash Plugin for Browsers
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Flash Plugin for Browsers
ID: SUSE-SU-2016:1826-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Workstation Extension 12-SP1, SUSE Linux Enterprise Desktop 12-SP1
Datum: Di, 19. Juli 2016, 18:33
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4176
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4232
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4247
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4227
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4219
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4248
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4188
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4172
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4240
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4249
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4222
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4220
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4245
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4241
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4246
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4189
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4236
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4233
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4229
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4244
Applikationen: Flash Plugin for Browsers

Originalnachricht

   SUSE Security Update: Security update for flash-player
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:1826-1
Rating: important
References: #988579
Cross-References: CVE-2016-4172 CVE-2016-4173 CVE-2016-4174
CVE-2016-4175 CVE-2016-4176 CVE-2016-4177
CVE-2016-4178 CVE-2016-4179 CVE-2016-4180
CVE-2016-4181 CVE-2016-4182 CVE-2016-4183
CVE-2016-4184 CVE-2016-4185 CVE-2016-4186
CVE-2016-4187 CVE-2016-4188 CVE-2016-4189
CVE-2016-4190 CVE-2016-4217 CVE-2016-4218
CVE-2016-4219 CVE-2016-4220 CVE-2016-4221
CVE-2016-4222 CVE-2016-4223 CVE-2016-4224
CVE-2016-4225 CVE-2016-4226 CVE-2016-4227
CVE-2016-4228 CVE-2016-4229 CVE-2016-4230
CVE-2016-4231 CVE-2016-4232 CVE-2016-4233
CVE-2016-4234 CVE-2016-4235 CVE-2016-4236
CVE-2016-4237 CVE-2016-4238 CVE-2016-4239
CVE-2016-4240 CVE-2016-4241 CVE-2016-4242
CVE-2016-4243 CVE-2016-4244 CVE-2016-4245
CVE-2016-4246 CVE-2016-4247 CVE-2016-4248
CVE-2016-4249
Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP1
SUSE Linux Enterprise Desktop 12-SP1
______________________________________________________________________________

An update that fixes 52 vulnerabilities is now available.

Description:

Adobe Flash Player was updated to 11.2.202.632 to fix many security issues
tracked under the upstream advisory APSB16-25, allowing remote attackers
to execute arbitrary code when delivering specially crafted Flash content.

The following vulnerabilities were fixed:

- CVE-2016-4172: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4173: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4174: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4175: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4176: stack corruption vulnerability that could lead to code
execution
- CVE-2016-4177: stack corruption vulnerability that could lead to code
execution
- CVE-2016-4178: security bypass vulnerability that could lead to
information disclosure
- CVE-2016-4179: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4180: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4181: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4182: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4183: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4184: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4185: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4186: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4187: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4188: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4189: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4190: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4217: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4218: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4219: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4220: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4221: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4222: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4223: type confusion vulnerability that could lead to code
execution
- CVE-2016-4224: type confusion vulnerability that could lead to code
execution
- CVE-2016-4225: type confusion vulnerability that could lead to code
execution
- CVE-2016-4226: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4227: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4228: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4229: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4230: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4231: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4232: memory leak vulnerability
- CVE-2016-4233: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4234: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4235: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4236: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4237: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4238: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4239: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4240: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4241: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4242: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4243: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4244: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4245: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4246: memory corruption vulnerability that could lead to code
execution
- CVE-2016-4247: race condition vulnerability that could lead to
information disclosure
- CVE-2016-4248: use-after-free vulnerability that could lead to code
execution
- CVE-2016-4249: heap buffer overflow vulnerability that could lead to
code execution


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Workstation Extension 12-SP1:

zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1073=1

- SUSE Linux Enterprise Desktop 12-SP1:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1073=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

flash-player-11.2.202.632-136.1
flash-player-gnome-11.2.202.632-136.1

- SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

flash-player-11.2.202.632-136.1
flash-player-gnome-11.2.202.632-136.1


References:

https://www.suse.com/security/cve/CVE-2016-4172.html
https://www.suse.com/security/cve/CVE-2016-4173.html
https://www.suse.com/security/cve/CVE-2016-4174.html
https://www.suse.com/security/cve/CVE-2016-4175.html
https://www.suse.com/security/cve/CVE-2016-4176.html
https://www.suse.com/security/cve/CVE-2016-4177.html
https://www.suse.com/security/cve/CVE-2016-4178.html
https://www.suse.com/security/cve/CVE-2016-4179.html
https://www.suse.com/security/cve/CVE-2016-4180.html
https://www.suse.com/security/cve/CVE-2016-4181.html
https://www.suse.com/security/cve/CVE-2016-4182.html
https://www.suse.com/security/cve/CVE-2016-4183.html
https://www.suse.com/security/cve/CVE-2016-4184.html
https://www.suse.com/security/cve/CVE-2016-4185.html
https://www.suse.com/security/cve/CVE-2016-4186.html
https://www.suse.com/security/cve/CVE-2016-4187.html
https://www.suse.com/security/cve/CVE-2016-4188.html
https://www.suse.com/security/cve/CVE-2016-4189.html
https://www.suse.com/security/cve/CVE-2016-4190.html
https://www.suse.com/security/cve/CVE-2016-4217.html
https://www.suse.com/security/cve/CVE-2016-4218.html
https://www.suse.com/security/cve/CVE-2016-4219.html
https://www.suse.com/security/cve/CVE-2016-4220.html
https://www.suse.com/security/cve/CVE-2016-4221.html
https://www.suse.com/security/cve/CVE-2016-4222.html
https://www.suse.com/security/cve/CVE-2016-4223.html
https://www.suse.com/security/cve/CVE-2016-4224.html
https://www.suse.com/security/cve/CVE-2016-4225.html
https://www.suse.com/security/cve/CVE-2016-4226.html
https://www.suse.com/security/cve/CVE-2016-4227.html
https://www.suse.com/security/cve/CVE-2016-4228.html
https://www.suse.com/security/cve/CVE-2016-4229.html
https://www.suse.com/security/cve/CVE-2016-4230.html
https://www.suse.com/security/cve/CVE-2016-4231.html
https://www.suse.com/security/cve/CVE-2016-4232.html
https://www.suse.com/security/cve/CVE-2016-4233.html
https://www.suse.com/security/cve/CVE-2016-4234.html
https://www.suse.com/security/cve/CVE-2016-4235.html
https://www.suse.com/security/cve/CVE-2016-4236.html
https://www.suse.com/security/cve/CVE-2016-4237.html
https://www.suse.com/security/cve/CVE-2016-4238.html
https://www.suse.com/security/cve/CVE-2016-4239.html
https://www.suse.com/security/cve/CVE-2016-4240.html
https://www.suse.com/security/cve/CVE-2016-4241.html
https://www.suse.com/security/cve/CVE-2016-4242.html
https://www.suse.com/security/cve/CVE-2016-4243.html
https://www.suse.com/security/cve/CVE-2016-4244.html
https://www.suse.com/security/cve/CVE-2016-4245.html
https://www.suse.com/security/cve/CVE-2016-4246.html
https://www.suse.com/security/cve/CVE-2016-4247.html
https://www.suse.com/security/cve/CVE-2016-4248.html
https://www.suse.com/security/cve/CVE-2016-4249.html
https://bugzilla.suse.com/988579

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung