ArchLinux: 201412-13: flashplugin: multiple issues
Summary
- CVE-2014-0580 (policy bypass)
A flaw allows remote attackers to bypass the same origin policy via
unspecified vectors.
- CVE-2014-0587 (arbitrary code execution)
A flaw allows attackers to execute arbitrary code or cause a denial of
service (memory corruption) via unspecified vectors.
- CVE-2014-8443 (arbitrary code execution)
A flaw allows attackers to execute arbitrary code via a use-after-free
vulnerability.
- CVE-2014-9163 (arbitrary code execution)
A flaw allows attackers to execute arbitrary code via a stack-based
buffer overflow vulnerability.
- CVE-2014-9164 (arbitrary code execution)
A flaw allows attackers to execute arbitrary code or cause a denial of
service (memory corruption) via unspecified vectors.
- CVE-2014-9162 (information disclosure)
A flaw allows attackers to obtain sensitive information via unspecified
vectors.
Resolution
Upgrade to 11.2.202.425-1.
# pacman -Syu "flashplugin>=11.2.202.425-1"
The problems have been fixed upstream in version 11.2.202.425.
References
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0580 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0587 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8443 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9162 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9163 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9164
Workaround
None.