openSUSE Security Update: Security update for Adobe Flash Player
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:1061-1
Rating:             important
References:         #934088 
Cross-References:   CVE-2015-3096 CVE-2015-3098 CVE-2015-3099
                    CVE-2015-3100 CVE-2015-3102 CVE-2015-3103
                    CVE-2015-3104 CVE-2015-3105 CVE-2015-3106
                    CVE-2015-3107 CVE-2015-3108
Affected Products:
                    openSUSE Evergreen 11.4
______________________________________________________________________________

   An update that fixes 11 vulnerabilities is now available.

Description:

   Adobe Flash Player was updated to 11.2.202.466 to fix multiple security
   issues.

   The following vulnerabilities were fixed:

   * CVE-2015-3096: bypass for CVE-2014-5333
   * CVE-2015-3098: vulnerabilities that could be exploited to bypass the
     same-origin-policy and lead to information disclosure
   * CVE-2015-3099: vulnerabilities that could be exploited to bypass the
     same-origin-policy and lead to information disclosure
   * CVE-2015-3100: stack overflow vulnerability that could lead to code
     execution
   * CVE-2015-3102: vulnerabilities that could be exploited to bypass the
     same-origin-policy and lead to information disclosure
   * CVE-2015-3103: use-after-free vulnerabilities that could lead to code
     execution
   * CVE-2015-3104: integer overflow vulnerability that could lead to code
     execution
   * CVE-2015-3105: memory corruption vulnerability that could lead to code
     execution
   * CVE-2015-3106: use-after-free vulnerabilities that could lead to code
     execution
   * CVE-2015-3107: use-after-free vulnerabilities that could lead to code
     execution
   * CVE-2015-3108: memory leak vulnerability that could be used to bypass
     ASLR


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Evergreen 11.4:

      zypper in -t patch 2015-17=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Evergreen 11.4 (i586 x86_64):

      flash-player-11.2.202.466-164.1
      flash-player-gnome-11.2.202.466-164.1
      flash-player-kde4-11.2.202.466-164.1


References:

   https://www.suse.com/security/cve/CVE-2015-3096.html
   https://www.suse.com/security/cve/CVE-2015-3098.html
   https://www.suse.com/security/cve/CVE-2015-3099.html
   https://www.suse.com/security/cve/CVE-2015-3100.html
   https://www.suse.com/security/cve/CVE-2015-3102.html
   https://www.suse.com/security/cve/CVE-2015-3103.html
   https://www.suse.com/security/cve/CVE-2015-3104.html
   https://www.suse.com/security/cve/CVE-2015-3105.html
   https://www.suse.com/security/cve/CVE-2015-3106.html
   https://www.suse.com/security/cve/CVE-2015-3107.html
   https://www.suse.com/security/cve/CVE-2015-3108.html
   https://bugzilla.suse.com/934088

openSUSE: 2015:1061-1: important: Adobe Flash Player

June 13, 2015
An update that fixes 11 vulnerabilities is now available

Description

Adobe Flash Player was updated to 11.2.202.466 to fix multiple security issues. The following vulnerabilities were fixed: * CVE-2015-3096: bypass for CVE-2014-5333 * CVE-2015-3098: vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure * CVE-2015-3099: vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure * CVE-2015-3100: stack overflow vulnerability that could lead to code execution * CVE-2015-3102: vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure * CVE-2015-3103: use-after-free vulnerabilities that could lead to code execution * CVE-2015-3104: integer overflow vulnerability that could lead to code execution * CVE-2015-3105: memory corruption vulnerability that could lead to code execution * CVE-2015-3106: use-after-free vulnerabilities that could lead to code execution * CVE-2015-3107: use-after-free vulnerabilities that could lead to code execution * CVE-2015-3108: memory leak vulnerability that could be used to bypass ASLR

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Evergreen 11.4: zypper in -t patch 2015-17=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Evergreen 11.4 (i586 x86_64): flash-player-11.2.202.466-164.1 flash-player-gnome-11.2.202.466-164.1 flash-player-kde4-11.2.202.466-164.1


References

https://www.suse.com/security/cve/CVE-2015-3096.html https://www.suse.com/security/cve/CVE-2015-3098.html https://www.suse.com/security/cve/CVE-2015-3099.html https://www.suse.com/security/cve/CVE-2015-3100.html https://www.suse.com/security/cve/CVE-2015-3102.html https://www.suse.com/security/cve/CVE-2015-3103.html https://www.suse.com/security/cve/CVE-2015-3104.html https://www.suse.com/security/cve/CVE-2015-3105.html https://www.suse.com/security/cve/CVE-2015-3106.html https://www.suse.com/security/cve/CVE-2015-3107.html https://www.suse.com/security/cve/CVE-2015-3108.html https://bugzilla.suse.com/934088


Severity
Announcement ID: openSUSE-SU-2015:1061-1
Rating: important
Affected Products: openSUSE Evergreen 11.4 .

Related News