SUSE Security Update: Security update for flash-player
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:0724-1
Rating:             critical
References:         #766241 
Cross-References:   CVE-2012-2034 CVE-2012-2035 CVE-2012-2036
                    CVE-2012-2037 CVE-2012-2038 CVE-2012-2039
                    CVE-2012-2040
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP1
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available. It
   includes one version update.

Description:


   Flash Player has been updated to 11.2.202.236 which fixes
   various bugs and  critical security issues.

   The advisory published by Adobe can be found here:
   https://www.adobe.com/support/security/bulletins/apsb12-14.h
   tml
   

   These updates resolve

   * a memory corruption vulnerability that could lead to
   code execution (CVE-2012-2034).
   * a stack overflow vulnerability that could lead to
   code execution (CVE-2012-2035).
   * an integer overflow vulnerability that could lead to
   code execution (CVE-2012-2036).
   * a memory corruption vulnerability that could lead to
   code execution (CVE-2012-2037).
   * a security bypass vulnerability that could lead to
   information disclosure (CVE-2012-2038).
   * null dereference vulnerabilities that could lead to
   code execution (CVE-2012-2039).
   * a binary planting vulnerability in the Flash Player
   installer that could lead to code execution (CVE-2012-2040).

   Security Issue references:

   * CVE-2012-2034
   
   * CVE-2012-2035
   
   * CVE-2012-2036
   
   * CVE-2012-2037
   
   * CVE-2012-2038
   
   * CVE-2012-2039
   
   * CVE-2012-2040
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp1-flash-player-6404

   - SUSE Linux Enterprise Desktop 11 SP1:

      zypper in -t patch sledsp1-flash-player-6404

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.3.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.3.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.5.1


References:

   https://www.suse.com/security/cve/CVE-2012-2034.html
   https://www.suse.com/security/cve/CVE-2012-2035.html
   https://www.suse.com/security/cve/CVE-2012-2036.html
   https://www.suse.com/security/cve/CVE-2012-2037.html
   https://www.suse.com/security/cve/CVE-2012-2038.html
   https://www.suse.com/security/cve/CVE-2012-2039.html
   https://www.suse.com/security/cve/CVE-2012-2040.html
   https://bugzilla.novell.com/766241
   https://login.microfocus.com/nidp/app/login
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:0724-1: critical: flash-player

June 11, 2012
An update that fixes 7 vulnerabilities is now available

Summary

Flash Player has been updated to 11.2.202.236 which fixes various bugs and critical security issues. The advisory published by Adobe can be found here: https://www.adobe.com/support/security/bulletins/apsb12-14.h tml These updates resolve * a memory corruption vulnerability that could lead to code execution (CVE-2012-2034). * a stack overflow vulnerability that could lead to code execution (CVE-2012-2035). * an integer overflow vulnerability that could lead to code execution (CVE-2012-2036). * a memory corruption vulnerability that could lead to code execution (CVE-2012-2037). * a security bypass vulnerability that could lead to information disclosure (CVE-2012-2038). * null dereference vulnerabilities that could lead to code execution (CVE-2012-2039). * a binary planting vulnerability in the Flash Player installer that could lead to code execution (CVE-2012-2040). Security Issue references: * CVE-2012-2034 * CVE-2012-2035 * CVE-2012-2036 * CVE-2012-2037 * CVE-2012-2038 * CVE-2012-2039 * CVE-2012-2040 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp1-flash-player-6404 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-flash-player-6404 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.236]: flash-player-11.2.202.236-0.3.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.2.202.236]: flash-player-11.2.202.236-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.236]: flash-player-11.2.202.236-0.5.1

References

#766241

Cross- CVE-2012-2034 CVE-2012-2035 CVE-2012-2036

CVE-2012-2037 CVE-2012-2038 CVE-2012-2039

CVE-2012-2040

Affected Products:

SUSE Linux Enterprise Desktop 11 SP2

SUSE Linux Enterprise Desktop 11 SP1

SUSE Linux Enterprise Desktop 10 SP4

https://www.suse.com/security/cve/CVE-2012-2034.html

https://www.suse.com/security/cve/CVE-2012-2035.html

https://www.suse.com/security/cve/CVE-2012-2036.html

https://www.suse.com/security/cve/CVE-2012-2037.html

https://www.suse.com/security/cve/CVE-2012-2038.html

https://www.suse.com/security/cve/CVE-2012-2039.html

https://www.suse.com/security/cve/CVE-2012-2040.html

https://bugzilla.novell.com/766241

https://login.microfocus.com/nidp/app/login

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:0724-1
Rating: critical

Related News