SUSE-SU-2012:0724-1: critical: Security update for flash-player

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Jun 11 12:08:28 MDT 2012


   SUSE Security Update: Security update for flash-player
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:0724-1
Rating:             critical
References:         #766241 
Cross-References:   CVE-2012-2034 CVE-2012-2035 CVE-2012-2036
                    CVE-2012-2037 CVE-2012-2038 CVE-2012-2039
                    CVE-2012-2040
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP1
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available. It
   includes one version update.

Description:


   Flash Player has been updated to 11.2.202.236 which fixes
   various bugs and  critical security issues.

   The advisory published by Adobe can be found here:
   https://www.adobe.com/support/security/bulletins/apsb12-14.h
   tml
   <https://www.adobe.com/support/security/bulletins/apsb12-14.
   html>

   These updates resolve

   * a memory corruption vulnerability that could lead to
   code execution (CVE-2012-2034).
   * a stack overflow vulnerability that could lead to
   code execution (CVE-2012-2035).
   * an integer overflow vulnerability that could lead to
   code execution (CVE-2012-2036).
   * a memory corruption vulnerability that could lead to
   code execution (CVE-2012-2037).
   * a security bypass vulnerability that could lead to
   information disclosure (CVE-2012-2038).
   * null dereference vulnerabilities that could lead to
   code execution (CVE-2012-2039).
   * a binary planting vulnerability in the Flash Player
   installer that could lead to code execution (CVE-2012-2040).

   Security Issue references:

   * CVE-2012-2034
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2034
   >
   * CVE-2012-2035
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2035
   >
   * CVE-2012-2036
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2036
   >
   * CVE-2012-2037
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2037
   >
   * CVE-2012-2038
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2038
   >
   * CVE-2012-2039
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2039
   >
   * CVE-2012-2040
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2040
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp1-flash-player-6404

   - SUSE Linux Enterprise Desktop 11 SP1:

      zypper in -t patch sledsp1-flash-player-6404

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.3.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.3.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.236]:

      flash-player-11.2.202.236-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2012-2034.html
   http://support.novell.com/security/cve/CVE-2012-2035.html
   http://support.novell.com/security/cve/CVE-2012-2036.html
   http://support.novell.com/security/cve/CVE-2012-2037.html
   http://support.novell.com/security/cve/CVE-2012-2038.html
   http://support.novell.com/security/cve/CVE-2012-2039.html
   http://support.novell.com/security/cve/CVE-2012-2040.html
   https://bugzilla.novell.com/766241
   http://download.novell.com/patch/finder/?keywords=32f63c722aa23420e1bd3dc2156e2cda
   http://download.novell.com/patch/finder/?keywords=887bb347a8b547f7a9640dc2346b0aab



More information about the sle-security-updates mailing list