VARIoT IoT vulnerabilities database
| VAR-201512-0216 | CVE-2015-8644 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion.". Supplementary information : CWE Vulnerability type by CWE-843:Access of Resource Using Incompatible Type ( Mixing of molds ) Has been identified. http://cwe.mitre.org/data/definitions/843.htmlBy the attacker, " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0.204 and earlier versions; AIR for Android 20 based on the Android platform. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0220 | CVE-2015-8648 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the MovieClip object. By calling the setMask method of a MovieClip object, an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0215 | CVE-2015-8643 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0208 | CVE-2015-8636 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8645. This vulnerability CVE-2015-8459 , CVE-2015-8460 ,and CVE-2015-8645 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
(CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635,
CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640,
CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644,
CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648,
CVE-2015-8649, CVE-2015-8650, CVE-2015-8651)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.559.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0213 | CVE-2015-8642 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0212 | CVE-2015-8641 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0211 | CVE-2015-8640 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0210 | CVE-2015-8639 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the MovieClip object. By calling the hitTest method of a MovieClip object, an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0206 | CVE-2015-8634 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201512-0207 | CVE-2015-8635 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0209 | CVE-2015-8638 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8647 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the MovieClip object. By calling the getBounds method of a MovieClip object, an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0219 | CVE-2015-8647 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. This vulnerability CVE-2015-8634 , CVE-2015-8635 , CVE-2015-8638 , CVE-2015-8639 , CVE-2015-8640 , CVE-2015-8641 , CVE-2015-8642 , CVE-2015-8643 , CVE-2015-8646 , CVE-2015-8648 , CVE-2015-8649 ,and CVE-2015-8650 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the MovieClip object. By calling the attachMovie method of a MovieClip object, an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely result in denial-of-service conditions. A use-after-free vulnerability exists in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 20.0.0.235 and earlier versions based on Windows and Macintosh platforms, Adobe Flash Player Extended Support Release 18.0.0.268 and earlier versions, AIR Desktop Runtime 20.0.0.204 and earlier versions; Windows-based , Macintosh, Linux and ChromeOS platforms Adobe Flash Player for Google Chrome 20.0.0.228 and previous versions; Windows 10-based Adobe Flash Player for Microsoft Edge and Internet Explorer 11 20.0.0.228 and previous versions; Windows 8.0 and 8.1-based platforms Adobe Flash Player for Internet Explorer 10 and 11 20.0.0.228 and previous versions; Adobe Flash Player for Linux 11.2.202.554 and previous versions based on Linux platforms; AIR SDK 20.0.0.204 and previous versions based on Windows, Macintosh, Android and iOS platforms , AIR SDK & Compiler 20.0.0. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:2697-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2697.html
Issue date: 2015-12-29
CVE Names: CVE-2015-8459 CVE-2015-8460 CVE-2015-8634
CVE-2015-8635 CVE-2015-8636 CVE-2015-8638
CVE-2015-8639 CVE-2015-8640 CVE-2015-8641
CVE-2015-8642 CVE-2015-8643 CVE-2015-8644
CVE-2015-8645 CVE-2015-8646 CVE-2015-8647
CVE-2015-8648 CVE-2015-8649 CVE-2015-8650
CVE-2015-8651
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB16-01
listed in the References section, could allow an attacker to create a
specially crafted SWF file that would cause flash-plugin to crash,
execute arbitrary code, or disclose sensitive information when the
victim loaded a page containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1294580 - flash-plugin: multiple code execution issues fixed in APSB16-01
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.559-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.559-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.559-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-8459
https://access.redhat.com/security/cve/CVE-2015-8460
https://access.redhat.com/security/cve/CVE-2015-8634
https://access.redhat.com/security/cve/CVE-2015-8635
https://access.redhat.com/security/cve/CVE-2015-8636
https://access.redhat.com/security/cve/CVE-2015-8638
https://access.redhat.com/security/cve/CVE-2015-8639
https://access.redhat.com/security/cve/CVE-2015-8640
https://access.redhat.com/security/cve/CVE-2015-8641
https://access.redhat.com/security/cve/CVE-2015-8642
https://access.redhat.com/security/cve/CVE-2015-8643
https://access.redhat.com/security/cve/CVE-2015-8644
https://access.redhat.com/security/cve/CVE-2015-8645
https://access.redhat.com/security/cve/CVE-2015-8646
https://access.redhat.com/security/cve/CVE-2015-8647
https://access.redhat.com/security/cve/CVE-2015-8648
https://access.redhat.com/security/cve/CVE-2015-8649
https://access.redhat.com/security/cve/CVE-2015-8650
https://access.redhat.com/security/cve/CVE-2015-8651
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWgnSsXlSAg2UNWIIRAppGAJ9mRCwQ3gpOgegJva9BnnZvPVV7OACgqRuU
xm8a97tVCxdqrTr2yuTCblQ=
=AUkv
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.559"
References
==========
[ 1 ] CVE-2015-8045
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8045
[ 2 ] CVE-2015-8047
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8047
[ 3 ] CVE-2015-8048
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8048
[ 4 ] CVE-2015-8049
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8049
[ 5 ] CVE-2015-8050
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8050
[ 6 ] CVE-2015-8055
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8055
[ 7 ] CVE-2015-8056
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8056
[ 8 ] CVE-2015-8057
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8057
[ 9 ] CVE-2015-8058
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8058
[ 10 ] CVE-2015-8059
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8059
[ 11 ] CVE-2015-8060
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8060
[ 12 ] CVE-2015-8061
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8061
[ 13 ] CVE-2015-8062
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8062
[ 14 ] CVE-2015-8063
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8063
[ 15 ] CVE-2015-8064
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8064
[ 16 ] CVE-2015-8065
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8065
[ 17 ] CVE-2015-8066
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8066
[ 18 ] CVE-2015-8067
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8067
[ 19 ] CVE-2015-8068
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8068
[ 20 ] CVE-2015-8069
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8069
[ 21 ] CVE-2015-8070
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8070
[ 22 ] CVE-2015-8071
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8071
[ 23 ] CVE-2015-8401
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8401
[ 24 ] CVE-2015-8402
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8402
[ 25 ] CVE-2015-8403
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8403
[ 26 ] CVE-2015-8404
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8404
[ 27 ] CVE-2015-8405
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8405
[ 28 ] CVE-2015-8406
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8406
[ 29 ] CVE-2015-8407
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8407
[ 30 ] CVE-2015-8408
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8408
[ 31 ] CVE-2015-8409
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8409
[ 32 ] CVE-2015-8410
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8410
[ 33 ] CVE-2015-8411
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8411
[ 34 ] CVE-2015-8412
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8412
[ 35 ] CVE-2015-8413
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8413
[ 36 ] CVE-2015-8414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8414
[ 37 ] CVE-2015-8415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8415
[ 38 ] CVE-2015-8416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8416
[ 39 ] CVE-2015-8417
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8417
[ 40 ] CVE-2015-8418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8418
[ 41 ] CVE-2015-8419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8419
[ 42 ] CVE-2015-8420
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8420
[ 43 ] CVE-2015-8421
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8421
[ 44 ] CVE-2015-8422
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8422
[ 45 ] CVE-2015-8423
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8423
[ 46 ] CVE-2015-8424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8424
[ 47 ] CVE-2015-8425
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8425
[ 48 ] CVE-2015-8426
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8426
[ 49 ] CVE-2015-8427
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8427
[ 50 ] CVE-2015-8428
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8428
[ 51 ] CVE-2015-8429
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8429
[ 52 ] CVE-2015-8430
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8430
[ 53 ] CVE-2015-8431
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8431
[ 54 ] CVE-2015-8432
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8432
[ 55 ] CVE-2015-8433
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8433
[ 56 ] CVE-2015-8434
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8434
[ 57 ] CVE-2015-8435
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8435
[ 58 ] CVE-2015-8436
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8436
[ 59 ] CVE-2015-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8437
[ 60 ] CVE-2015-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8438
[ 61 ] CVE-2015-8439
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8439
[ 62 ] CVE-2015-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8440
[ 63 ] CVE-2015-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8441
[ 64 ] CVE-2015-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8442
[ 65 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 66 ] CVE-2015-8443
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8443
[ 67 ] CVE-2015-8445
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8445
[ 68 ] CVE-2015-8446
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8446
[ 69 ] CVE-2015-8447
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8447
[ 70 ] CVE-2015-8448
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8448
[ 71 ] CVE-2015-8449
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8449
[ 72 ] CVE-2015-8450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8450
[ 73 ] CVE-2015-8451
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8451
[ 74 ] CVE-2015-8452
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8452
[ 75 ] CVE-2015-8453
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8453
[ 76 ] CVE-2015-8454
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8454
[ 77 ] CVE-2015-8455
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8455
[ 78 ] CVE-2015-8459
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8459
[ 79 ] CVE-2015-8460
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8460
[ 80 ] CVE-2015-8635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8635
[ 81 ] CVE-2015-8636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8636
[ 82 ] CVE-2015-8638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8638
[ 83 ] CVE-2015-8639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8639
[ 84 ] CVE-2015-8640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8640
[ 85 ] CVE-2015-8641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8641
[ 86 ] CVE-2015-8642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8642
[ 87 ] CVE-2015-8643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8643
[ 88 ] CVE-2015-8644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8644
[ 89 ] CVE-2015-8645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8645
[ 90 ] CVE-2015-8646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8646
[ 91 ] CVE-2015-8647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8647
[ 92 ] CVE-2015-8648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8648
[ 93 ] CVE-2015-8649
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8649
[ 94 ] CVE-2015-8650
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8650
[ 95 ] CVE-2015-8651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8651
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201601-03
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201512-0515 | CVE-2015-7792 | CG-WLBARGS does not properly perform authentication |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Corega CG-WLBARGS devices allow remote attackers to perform administrative operations via unspecified vectors. CG-WLBARGS provided by Corega Inc is a wireless LAN router. CG-WLBARGS does not properly perform authentication. Kousuke Kawahira of DWANGO Co.,Ltd. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker who can access the product may log in with administrative privileges. As a result, an arbitrary administrative operations may be executed. A cross-site scripting vulnerability exists in WL-330NUL. Allows an attacker to exploit this vulnerability to inject arbitrary web scripts or HTML code.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
| VAR-201512-0517 | CVE-2015-7794 | CG-WLNCM4G may behave as an open resolver |
CVSS V2: 5.0 CVSS V3: 5.8 Severity: MEDIUM |
Corega CG-WLNCM4G devices provide an open DNS resolver, which allows remote attackers to cause a denial of service (traffic amplification) via crafted queries. CG-WLNCM4G provided by Corega Inc is a network camera. CG-WLNCM4G contains an issue where it may behave as an open resolver. SASABE Tetsuro of The University of Tokyo reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.The device may be leveraged for use in a DNS amplification attack and unknowingly become a part of a DDoS attack. Corega CG-WLNCM4G devices has a denial of service vulnerability. CG-WLNCM4G is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause a denial-of-service condition. Corega CG-WLBARGL is a wireless LAN router produced by Japan's Corega Corporation. A security vulnerability exists in the Corega CG-WLBARAGM device due to the program providing an open DNS resolver
| VAR-201601-0163 | CVE-2015-8612 | Blueman of plugins/mechanism/Network.py of Network class EnableNetwork Vulnerability gained in methods |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
The EnableNetwork method in the Network class in plugins/mechanism/Network.py in Blueman before 2.0.3 allows local users to gain privileges via the dhcp_handler argument. Blueman is a Bluetooth manager. Blueman has a remote privilege escalation vulnerability. A remote attacker can exploit this vulnerability to gain elevated privileges. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] blueman (SSA:2015-356-01)
New blueman packages are available for Slackware 13.37, 14.0, 14.1,
and -current to fix a security issue.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/blueman-r708-i486-4_slack14.1.txz: Rebuilt.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/blueman-r708-i486-2_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/blueman-r708-x86_64-2_slack13.37.txz
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/blueman-r708-i486-3_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/blueman-r708-x86_64-3_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/blueman-r708-i486-4_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/blueman-r708-x86_64-4_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/blueman-2.0.3-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/blueman-2.0.3-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.37 package:
65009da30d3cf60c32e561b0085ee1fd blueman-r708-i486-2_slack13.37.txz
Slackware x86_64 13.37 package:
a0e967b8857c9d71a9e1373d0c864d04 blueman-r708-x86_64-2_slack13.37.txz
Slackware 14.0 package:
37fcc1290f1a07cfd310f0c0b289eccb blueman-r708-i486-3_slack14.0.txz
Slackware x86_64 14.0 package:
62d2086a3ac4d71963722fd7583b275a blueman-r708-x86_64-3_slack14.0.txz
Slackware 14.1 package:
b974a87cad4f3b9521a1402c75e1b87e blueman-r708-i486-4_slack14.1.txz
Slackware x86_64 14.1 package:
d5b9c061018e190a7e770bee1ddc3601 blueman-r708-x86_64-4_slack14.1.txz
Slackware -current package:
0a37e8f7294902a9315455a3d8ecd54f xap/blueman-2.0.3-i586-1.txz
Slackware x86_64 -current package:
be29b1d932617c1cec46c2e8042eb525 xap/blueman-2.0.3-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg blueman-r708-i486-4_slack14.1.txz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlZ6MT4ACgkQakRjwEAQIjO34QCgiChwEWhragkSkMoC0/fAEHJ1
ZfUAn1QkjpRtY9C0wRphVloQsV+TtrqT
=KJB1
-----END PGP SIGNATURE-----
| VAR-201512-0385 | CVE-2015-6409 | Windows Run on Cisco Jabber In STARTTLS Vulnerabilities that are subject to downgrade attacks |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Cisco Jabber 10.6.x, 11.0.x, and 11.1.x on Windows allows man-in-the-middle attackers to conduct STARTTLS downgrade attacks and trigger cleartext XMPP sessions via unspecified vectors, aka Bug ID CSCuw87419. Cisco Jabber for Windows is prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack and allow the client to establish a cleartext XMPP connection. This may lead to other attacks.
This issue is being tracked by Cisco Bug ID's CSCux74848 CSCux74895 CSCux74900 CSCux80122 and CSCux88529. The program provides online status display, instant messaging, voice and other functions. The following releases are affected: Cisco Jabber for Windows Release 10.6.x, Release 11.0.x, Release 11.1.x
| VAR-201601-0016 | CVE-2015-7575 | Mozilla Firefox Used in Mozilla Network Security Services Vulnerable to server impersonation |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlMan-in-the-middle attacks (man-in-the-middle attack) Could cause a server to be impersonated by inducing a collision. Mozilla Network Security Services is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks.
This issue is fixed in:
Firefox 43.0.2
Firefox ESR 38.5.2
Network Security Services 3.20.2.
For the oldstable distribution (wheezy), these problems have been fixed
in version 6b38-1.13.10-1~deb7u1.
We recommend that you upgrade your openjdk-6 packages. Description:
IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM
Java Software Development Kit.
This update fixes several vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further information
about these flaws can be found on the IBM Java Security alerts page, listed
in the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-7981,
CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0402, CVE-2016-0448,
CVE-2016-0466, CVE-2016-0483, CVE-2016-0494)
Note: This update also disallows the use of the MD5 hash algorithm in the
certification path processing. The use of MD5 can be re-enabled by removing
MD5 from the jdk.certpath.disabledAlgorithms security property defined in
the java.security file. Bugs fixed (https://bugzilla.redhat.com/):
1276416 - CVE-2015-7981 libpng: Out-of-bounds read in png_convert_to_rfc1123
1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
1289841 - CVE-2015-7575 TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
1291312 - CVE-2015-8540 libpng: underflow read in png_check_keyword()
1298906 - CVE-2016-0494 ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)
1298957 - CVE-2016-0402 OpenJDK: URL deserialization inconsistencies (Networking, 8059054)
1299073 - CVE-2016-0448 OpenJDK: logging of RMI connection secrets (JMX, 8130710)
1299385 - CVE-2016-0466 OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962)
1299441 - CVE-2016-0483 OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017)
1302689 - CVE-2015-5041 IBM JDK: J9 JVM allows code to invoke non-public interface methods
6. ==========================================================================
Ubuntu Security Notice USN-2863-1
January 07, 2016
openssl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
OpenSSL could be made to expose sensitive information over the network.
Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
Details:
Karthikeyan Bhargavan and Gaetan Leurent discovered that OpenSSL
incorrectly allowed MD5 to be used for TLS 1.2 connections. If a remote
attacker were able to perform a man-in-the-middle attack, this flaw could
be exploited to view sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
libssl1.0.0 1.0.1-4ubuntu5.33
After a standard system update you need to reboot your computer to make
all the necessary changes.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201706-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: mbed TLS: Multiple vulnerabilities
Date: June 20, 2017
Bugs: #562608, #571102, #618824
ID: 201706-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in mbed TLS, the worst of
which could lead to the remote execution of arbitrary code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/mbedtls < 2.4.2 >= 2.4.2
Description
===========
Multiple vulnerabilities have been discovered in mbed TLS. Please
review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All mbed TLS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/mbedtls-2.4.2"
References
==========
[ 1 ] CVE-2015-5291
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5291
[ 2 ] CVE-2015-7575
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575
[ 3 ] CVE-2017-2784
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2784
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201706-18
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--meXqunA8BhEhIM1DNPs3RlHKbtgWVCnXm--
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: gnutls security update
Advisory ID: RHSA-2016:0012-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0012.html
Issue date: 2016-01-07
CVE Names: CVE-2015-7575
=====================================================================
1. Summary:
Updated gnutls packages that fix one security issue are now available for
Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
The GnuTLS library provides support for cryptographic algorithms and for
protocols such as Transport Layer Security (TLS).
A flaw was found in the way TLS 1.2 could use the MD5 hash function for
signing ServerKeyExchange and Client Authentication packets during a TLS
handshake. A man-in-the-middle attacker able to force a TLS connection to
use the MD5 hash function could use this flaw to conduct collision attacks
to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575)
All gnutls users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. For the update to take
effect, all applications linked to the GnuTLS library must be restarted.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1289841 - CVE-2015-7575 TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
gnutls-2.8.5-19.el6_7.src.rpm
i386:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-utils-2.8.5-19.el6_7.i686.rpm
x86_64:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-2.8.5-19.el6_7.x86_64.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-utils-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
x86_64:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.x86_64.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
gnutls-2.8.5-19.el6_7.src.rpm
x86_64:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-2.8.5-19.el6_7.x86_64.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-utils-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.x86_64.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
gnutls-2.8.5-19.el6_7.src.rpm
i386:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-utils-2.8.5-19.el6_7.i686.rpm
ppc64:
gnutls-2.8.5-19.el6_7.ppc.rpm
gnutls-2.8.5-19.el6_7.ppc64.rpm
gnutls-debuginfo-2.8.5-19.el6_7.ppc.rpm
gnutls-debuginfo-2.8.5-19.el6_7.ppc64.rpm
gnutls-devel-2.8.5-19.el6_7.ppc.rpm
gnutls-devel-2.8.5-19.el6_7.ppc64.rpm
gnutls-utils-2.8.5-19.el6_7.ppc64.rpm
s390x:
gnutls-2.8.5-19.el6_7.s390.rpm
gnutls-2.8.5-19.el6_7.s390x.rpm
gnutls-debuginfo-2.8.5-19.el6_7.s390.rpm
gnutls-debuginfo-2.8.5-19.el6_7.s390x.rpm
gnutls-devel-2.8.5-19.el6_7.s390.rpm
gnutls-devel-2.8.5-19.el6_7.s390x.rpm
gnutls-utils-2.8.5-19.el6_7.s390x.rpm
x86_64:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-2.8.5-19.el6_7.x86_64.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.x86_64.rpm
gnutls-utils-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
ppc64:
gnutls-debuginfo-2.8.5-19.el6_7.ppc.rpm
gnutls-debuginfo-2.8.5-19.el6_7.ppc64.rpm
gnutls-guile-2.8.5-19.el6_7.ppc.rpm
gnutls-guile-2.8.5-19.el6_7.ppc64.rpm
s390x:
gnutls-debuginfo-2.8.5-19.el6_7.s390.rpm
gnutls-debuginfo-2.8.5-19.el6_7.s390x.rpm
gnutls-guile-2.8.5-19.el6_7.s390.rpm
gnutls-guile-2.8.5-19.el6_7.s390x.rpm
x86_64:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
gnutls-2.8.5-19.el6_7.src.rpm
i386:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-utils-2.8.5-19.el6_7.i686.rpm
x86_64:
gnutls-2.8.5-19.el6_7.i686.rpm
gnutls-2.8.5-19.el6_7.x86_64.rpm
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-devel-2.8.5-19.el6_7.i686.rpm
gnutls-devel-2.8.5-19.el6_7.x86_64.rpm
gnutls-utils-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
x86_64:
gnutls-debuginfo-2.8.5-19.el6_7.i686.rpm
gnutls-debuginfo-2.8.5-19.el6_7.x86_64.rpm
gnutls-guile-2.8.5-19.el6_7.i686.rpm
gnutls-guile-2.8.5-19.el6_7.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source:
gnutls-3.3.8-14.el7_2.src.rpm
x86_64:
gnutls-3.3.8-14.el7_2.i686.rpm
gnutls-3.3.8-14.el7_2.x86_64.rpm
gnutls-dane-3.3.8-14.el7_2.i686.rpm
gnutls-dane-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-utils-3.3.8-14.el7_2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
gnutls-c++-3.3.8-14.el7_2.i686.rpm
gnutls-c++-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-devel-3.3.8-14.el7_2.i686.rpm
gnutls-devel-3.3.8-14.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
gnutls-3.3.8-14.el7_2.src.rpm
x86_64:
gnutls-3.3.8-14.el7_2.i686.rpm
gnutls-3.3.8-14.el7_2.x86_64.rpm
gnutls-dane-3.3.8-14.el7_2.i686.rpm
gnutls-dane-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-utils-3.3.8-14.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
gnutls-c++-3.3.8-14.el7_2.i686.rpm
gnutls-c++-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-devel-3.3.8-14.el7_2.i686.rpm
gnutls-devel-3.3.8-14.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
gnutls-3.3.8-14.el7_2.src.rpm
ppc64:
gnutls-3.3.8-14.el7_2.ppc.rpm
gnutls-3.3.8-14.el7_2.ppc64.rpm
gnutls-c++-3.3.8-14.el7_2.ppc.rpm
gnutls-c++-3.3.8-14.el7_2.ppc64.rpm
gnutls-dane-3.3.8-14.el7_2.ppc.rpm
gnutls-dane-3.3.8-14.el7_2.ppc64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.ppc.rpm
gnutls-debuginfo-3.3.8-14.el7_2.ppc64.rpm
gnutls-devel-3.3.8-14.el7_2.ppc.rpm
gnutls-devel-3.3.8-14.el7_2.ppc64.rpm
gnutls-utils-3.3.8-14.el7_2.ppc64.rpm
ppc64le:
gnutls-3.3.8-14.el7_2.ppc64le.rpm
gnutls-c++-3.3.8-14.el7_2.ppc64le.rpm
gnutls-dane-3.3.8-14.el7_2.ppc64le.rpm
gnutls-debuginfo-3.3.8-14.el7_2.ppc64le.rpm
gnutls-devel-3.3.8-14.el7_2.ppc64le.rpm
gnutls-utils-3.3.8-14.el7_2.ppc64le.rpm
s390x:
gnutls-3.3.8-14.el7_2.s390.rpm
gnutls-3.3.8-14.el7_2.s390x.rpm
gnutls-c++-3.3.8-14.el7_2.s390.rpm
gnutls-c++-3.3.8-14.el7_2.s390x.rpm
gnutls-dane-3.3.8-14.el7_2.s390.rpm
gnutls-dane-3.3.8-14.el7_2.s390x.rpm
gnutls-debuginfo-3.3.8-14.el7_2.s390.rpm
gnutls-debuginfo-3.3.8-14.el7_2.s390x.rpm
gnutls-devel-3.3.8-14.el7_2.s390.rpm
gnutls-devel-3.3.8-14.el7_2.s390x.rpm
gnutls-utils-3.3.8-14.el7_2.s390x.rpm
x86_64:
gnutls-3.3.8-14.el7_2.i686.rpm
gnutls-3.3.8-14.el7_2.x86_64.rpm
gnutls-c++-3.3.8-14.el7_2.i686.rpm
gnutls-c++-3.3.8-14.el7_2.x86_64.rpm
gnutls-dane-3.3.8-14.el7_2.i686.rpm
gnutls-dane-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-devel-3.3.8-14.el7_2.i686.rpm
gnutls-devel-3.3.8-14.el7_2.x86_64.rpm
gnutls-utils-3.3.8-14.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
gnutls-3.3.8-14.el7_2.src.rpm
x86_64:
gnutls-3.3.8-14.el7_2.i686.rpm
gnutls-3.3.8-14.el7_2.x86_64.rpm
gnutls-c++-3.3.8-14.el7_2.i686.rpm
gnutls-c++-3.3.8-14.el7_2.x86_64.rpm
gnutls-dane-3.3.8-14.el7_2.i686.rpm
gnutls-dane-3.3.8-14.el7_2.x86_64.rpm
gnutls-debuginfo-3.3.8-14.el7_2.i686.rpm
gnutls-debuginfo-3.3.8-14.el7_2.x86_64.rpm
gnutls-devel-3.3.8-14.el7_2.i686.rpm
gnutls-devel-3.3.8-14.el7_2.x86_64.rpm
gnutls-utils-3.3.8-14.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-7575
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/articles/2112261
http://www.mitls.org/pages/attacks/SLOTH
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWjzBEXlSAg2UNWIIRAneyAJ9aciz39R9gzfj5dYW26H8tbGksEgCeKanu
UkpOhGBjlzKUJ4o9g/rGENk=
=++H6
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201512-0403 | CVE-2015-6431 | Cisco IOS XE Service disruption in (DoS) Vulnerabilities |
CVSS V2: 6.1 CVSS V3: 6.5 Severity: MEDIUM |
Cisco IOS XE 16.1.1 allows remote attackers to cause a denial of service (device reload) via a packet with the 00-00-00-00-00-00 source MAC address, aka Bug ID CSCux48405. An attacker could exploit the vulnerability to reinstall an affected device and deny service to a legitimate user.
This issue is being tracked by Cisco Bug ID CSCux48405
| VAR-201601-0390 | CVE-2015-7445 | IBM B2B Advanced Communications Information Disclosure Vulnerability |
CVSS V2: 3.5 CVSS V3: 4.3 Severity: MEDIUM |
IBM Multi-Enterprise Integration Gateway 1.0 through 1.0.0.1 and B2B Advanced Communications 1.x before 1.0.0.4, when guest access is configured, allow remote authenticated users to obtain sensitive information by reading error messages in responses. IBM B2B Advanced Communication is a communications gateway product from IBM Corporation of the United States. An information disclosure vulnerability exists in IBM B2B Advanced Communications versions 1.0.0.2 and 1.0.0.3. The following products and versions are affected: IBM Multi-Enterprise Integration Gateway version 1.0 to version 1.0.0.1
| VAR-201601-0567 | CVE-2015-5434 | HP H3C Comware 5 and Comware 7 Vulnerabilities that prevent access restrictions on devices |
CVSS V2: 6.4 CVSS V3: 6.5 Severity: MEDIUM |
HPE Networking Products, originally branded as Comware 5, Comware 7, H3C, or HP, allow remote attackers to bypass intended access restrictions or cause a denial of service via "Virtual routing and forwarding (VRF) hopping.". H3CComware is the core software platform of H3C and builds the foundation of its IP network products. H3CComware5/7 devices have security vulnerabilities. HP Network Products are prone to an unspecified remote denial-of-service vulnerability.
Exploiting this issue allows remote attackers to trigger denial-of-service conditions and gain unauthorized access. This may aid in further attacks. Both HP H3C Comware 5 and 7 are network communication platforms of Hewlett-Packard (HP). The platform fully supports the IPv6 protocol, comprehensively enhances the MPLS service, supports MPLS TE (Traffic Engineering, traffic engineering) and adopts a unified open API interface mechanism. A security vulnerability exists in HP H3C Comware 5 and 7 appliances. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c04779492
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04779492
Version: 3
HPSBHF03419 rev.3 - HPE Networking Products, Remote Denial of Service (DoS),
Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-12-18
Last Updated: 2016-01-29
Potential Security Impact: Remote Denial of Service (DoS), unauthorized
access
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified in HPE Networking
Products.
Note: This vulnerability could be exploited remotely as a result of the
following network interface conditions:
VRF (Virtual Routing and Forwarding) is enabled.
MPLS (Multiprotocol Label Switching) is disabled.
MPLS-labeled packets are received that match FIB (Forwarding Information
Base) entries.
When all the above conditions exist, the interface could incorrectly forward
the MPLS-labeled packets.
References:
CVE-2015-5434
SSRT102034
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION
section below for a list of impacted products.
Note: all product versions are impacted prior to the fixed versions listed.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-5434 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett Packard Enterprise Company thanks G. Geshev from MWR Labs. for
reporting this issue to security-alert@hpe.com
RESOLUTION
HP has provided the following software updates to resolve the vulnerability
in the HP Networking products listed.
Family
Fixed Version
HP Branded Products Impacted
H3C Branded Products Impacted
MSR20 (Comware 5)
R2514P01 or later
JD432A HP A-MSR20-21 Router
JD662A HP MSR20-20 Router
JD663A HP A-MSR20-21 Router
JD663B HP MSR20-21 Router
JD664A HP MSR20-40 Router
JF228A HP MSR20-40 Router
JF283A) HP MSR20-20 Router
N/A
MSR20-1X (Comware 5)
R2514P01 or later
JD431A HP MSR20-10 Router
JD667A HP MSR20-15 IW Multi-Service Router
JD668A HP MSR20-13 Multi-Service Router
JD669A HP MSR20-13 W Multi-Service Router
JD670A HP MSR20-15 A Multi-Service Router
JD671A HP MSR20-15 AW Multi-Service Router
JD672A HP MSR20-15 I Multi-Service Router
JD673A HP MSR20-11 Multi-Service Router
JD674A HP MSR20-12 Multi-Service Router
JD675A HP MSR20-12 W Multi-Service Router
JD676A HP MSR20-12 T1 Multi-Service Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
JG209A HP MSR20-12-T-W Router (NA)
JG210A HP MSR20-13-W Router (NA)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-11 (0235A31V)
H3C MSR 20-12 (0235A32E)
H3C MSR 20-12 T1 (0235A32B)
H3C MSR 20-13 (0235A31W)
H3C MSR 20-13 W (0235A31X)
H3C MSR 20-15 A (0235A31Q)
H3C MSR 20-15 A W (0235A31R)
H3C MSR 20-15 I (0235A31N)
H3C MSR 20-15 IW (0235A31P)
H3C MSR20-12 W (0235A32G)
MSR 30 (Comware 5)
R2514P01 or later
JD654A HP MSR30-60 POE Multi-Service Router
JD657A HP MSR30-40 Multi-Service Router
JD658A HP MSR30-60 Multi-Service Router
JD660A HP MSR30-20 POE Multi-Service Router
JD661A HP MSR30-40 POE Multi-Service Router
JD666A HP MSR30-20 Multi-Service Router
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF232A HP RTMSR3040-AC-OVSAS-H3
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C MSR 30-20 RTVZ33020AS Router Host(AC) (0235A20S)
H3C MSR 30-20 (0235A19L)
H3C MSR 30-20 POE (0235A239)
H3C MSR 30-40 (0235A20J)
H3C MSR 30-40 POE (0235A25R)
H3C MSR 30-60 (0235A20K)
H3C MSR 30-60 POE (0235A25S)
H3C RT-MSR3040-AC-OVS-AS-H3 (0235A20V)
MSR 30-16 (Comware 5)
R2514P01 or later
JD659A HP MSR30-16 POE Multi-Service Router
JD665A HP MSR30-16 Multi-Service Router
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
H3C MSR 30-16 (0235A237)
H3C MSR 30-16 POE (0235A238)
MSR 30-1X (Comware 5)
R2514P01 or later
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
2FE 2SIC 1XMIM 256DDR (0235A39H)
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
MSR 50 (Comware 5)
R2514P01 or later
JD433A HP MSR50-40 Router
JD653A HP MSR50 Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR5040-DCOVS-H3C (0235A20P)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
MSR 50-G2 (Comware 5)
R2514P01 or later
JD429A HP MSR50 G2 Processor Module
JD429B HP MSR50 G2 Processor Module
H3C H3C MSR 50 Processor Module-G2 (0231A84Q)
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD
(0231A0KL)
MSR 9XX (Comware 5)
R2514P01 or later
JF812A HP MSR900 Router
JF813A HP MSR920 Router
JF814A HP MSR900-W Router
JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr
JG207A HP MSR900-W Router (NA)
JG208A HP MSR920-W Router (NA)
H3C MSR 900 Router with 802.11b/g 2 FE WAN 4 FE LAN 256DDR 802.11b
(0235A0C2)
H3C MSR 900 Router 2 FE WAN 4 FE LAN 256DDR (0235A0BX)
H3C MSR 920 Router with 802.11b/g 2 FE WAN 8 FE LAN 256DDR (0235A0C4)
H3C MSR 920 Router 2 FE WAN 8 FE LAN 256DDR (0235A0C0)
MSR 93X (Comware 5)
R2514P01 or later
JG512A HP MSR930 Wireless Router
JG513A HP MSR930 3G Router
JG514A HP MSR931 Router
JG515A HP MSR931 3G Router
JG516A HP MSR933 Router
JG517A HP MSR933 3G Router
JG518A HP MSR935 Router
JG519A HP MSR935 Wireless Router
JG520A HP MSR935 3G Router
JG531A HP MSR931 Dual 3G Router
JG596A HP MSR930 4G LTE/3G CDMA Router
JG597A HP MSR936 Wireless Router
JG665A HP MSR930 4G LTE/3G WCDMA Global Router
JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
N/A
MSR1000 (Comware 5)
R2514P01 or later
JG732A HP MSR1003-8 AC Router
N/A
MSR20 RU (Comware 5 Low Encryption SW)
R2514L03 or later
JD663B HP MSR20-21 Router
JF228A HP MSR20-40 Router
JF283A HP MSR20-20 Router
H3C RT-MSR2020-AC-OVS-H3C (0235A324)
H3C RT-MSR2040-AC-OVS-H3 (0235A326)
MSR20-1X RU (Comware 5 Low Encryption SW)
R2514L03 or later
JD431A HP MSR20-10 Router
JF236A HP MSR20-15-I Router
JF237A HP MSR20-15-A Router
JF238A HP MSR20-15-I-W Router
JF239A HP MSR20-11 Router
JF240A HP MSR20-13 Router
JF241A HP MSR20-12 Router
JF806A HP MSR20-12-T Router
JF807A HP MSR20-12-W Router
JF808A HP MSR20-13-W Router
JF809A HP MSR20-15-A-W Router
JF817A HP MSR20-15 Router
H3C MSR 20-10 (0235A0A7)
H3C RT-MSR2015-AC-OVS-I-H3 (0235A394)
H3C RT-MSR2015-AC-OVS-A-H3 (0235A392)
H3C RT-MSR2015-AC-OVS-AW-H3 (0235A393)
H3C RT-MSR2011-AC-OVS-H3 (0235A395)
H3C RT-MSR2013-AC-OVS-H3 (0235A390)
H3C RT-MSR2012-AC-OVS-H3 (0235A396)
H3C RT-MSR2012-TAC-OVS-H3 (0235A398)
H3C RT-MSR2012-AC-OVS-W-H3 (0235A397)
H3C RT-MSR2013-AC-OVS-W-H3 (0235A391)
H3C RT-MSR2015-AC-OVS-IW-H3 (0235A38V)
H3C MSR 20-15 Router Host(AC) 1 FE 4 LSW 1 ADSLoPOTS 1 DSIC (0235A0A8)
MSR30 RU (Comware 5 Low Encryption SW)
R2514L03 or later
JF229A HP MSR30-40 Router
JF230A HP MSR30-60 Router
JF235A HP MSR30-20 DC Router
JF284A HP MSR30-20 Router
JF287A HP MSR30-40 DC Router
JF801A HP MSR30-60 DC Router
JF802A HP MSR30-20 PoE Router
JF803A HP MSR30-40 PoE Router
JF804A HP MSR30-60 PoE Router
H3C RT-MSR3040-AC-OVS-H (0235A299)
H3C RT-MSR3060-AC-OVS-H3 (0235A320)
H3C RT-MSR3020-DC-OVS-H3 (0235A267)
H3C MSR 30-20 Router (0235A328)
H3C MSR 30-40 Router Host(DC) (0235A268)
H3C RT-MSR3060-DC-OVS-H3 (0235A269)
H3C RT-MSR3020-AC-POE-OVS-H3 (0235A322)
H3C RT-MSR3040-AC-POE-OVS-H3 (0235A323)
H3C RT-MSR3060-AC-POE-OVS-H3 (0235A296)
MSR30-16 RU (Comware 5 Low Encryption SW)
R2514L03 or later
JF233A HP MSR30-16 Router
JF234A HP MSR30-16 PoE Router
H3C RT-MSR3016-AC-OVS-H3 (0235A327)
H3C RT-MSR3016-AC-POE-OVS-H3 (0235A321)
MSR30-1X RU (Comware 5 Low Encryption SW)
R2514L03 or later
JF800A HP MSR30-11 Router
JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
JG182A HP MSR30-11E Router
JG183A HP MSR30-11F Router
JG184A HP MSR30-10 DC Router
H3C RT-MSR3011-AC-OVS-H3 (0235A29L)
H3C MSR 30-10 Router Host(AC) 2FE 2SIC 1XMIM 256DDR (0235A39H)
MSR50 RU(Comware 5 Low Encryption SW)
R2514L03 or later
JD433A HP MSR50-40 Router
JD653A HP MSR50Processor Module
JD655A HP MSR50-40 Multi-Service Router
JD656A HP MSR50-60 Multi-Service Router
JF231A HP MSR50-60 Router
JF285A HP MSR50-40 DC Router
JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
H3C MSR 50-40 Router (0235A297)
H3C MSR 50 Processor Module (0231A791)
H3C MSR 50-40 Chassis (0235A20N)
H3C MSR 50-60 Chassis (0235A20L)
H3C RT-MSR5060-AC-OVS-H3 (0235A298)
H3C MSR5040-DCOVS-H3C (0235A20P)
MSR50 G2 RU (Comware 5 Low Encryption SW)
R2514L03 or later
JD429B HP MSR50 G2 Processor Module
H3C MSR 50 High Performance Main Processing Unit 3GE (Combo) 256F/1GD
(0231A0KL)
12500 (Comware 5)
R1829 or later
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JC808A HP 12500 TAA Main Processing Unit
H3C S12508 Routing Switch (AC-1) (0235A0GE)
H3C S12518 Routing Switch (AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
9500E (Comware 5)
R1829 or later
JC124A HP A9508 Switch Chassis
JC124B HP 9505 Switch Chassis
JC125A HP A9512 Switch Chassis
JC125B HP 9512 Switch Chassis
JC474A HP A9508-V Switch Chassis
JC474B HP 9508-V Switch Chassis
H3C S9505E Routing-Switch Chassis (0235A0G6)
H3C S9512E Routing-Switch Chassis (0235A0G7)
H3C S9508E-V Routing-Switch Chassis (0235A38Q)
H3C S9505E Chassis w/ Fans (0235A38P)
H3C S9512E Chassis w/ Fans (0235A38R)
12500 (Comware 7)
R7375 or later
JC085A HP A12518 Switch Chassis
JC086A HP A12508 Switch Chassis
JC652A HP 12508 DC Switch Chassis
JC653A HP 12518 DC Switch Chassis
JC654A HP 12504 AC Switch Chassis
JC655A HP 12504 DC Switch Chassis
JF430A HP A12518 Switch Chassis
JF430B HP 12518 Switch Chassis
JF430C HP 12518 AC Switch Chassis
JF431A HP A12508 Switch Chassis
JF431B HP 12508 Switch Chassis
JF431C HP 12508 AC Switch Chassis
JC072B HP 12500 Main Processing Unit
JG497A HP 12500 MPU w/Comware V7 OS
JG782A HP FF 12508E AC Switch Chassis
JG783A HP FF 12508E DC Switch Chassis
JG784A HP FF 12518E AC Switch Chassis
JG785A HP FF 12518E DC Switch Chassis
JG802A HP FF 12500E MPU
JG836A HP FlexFabric 12518E AC Switch TAA-compliant Chassis
JG834A HP FlexFabric 12508E AC Switch TAA-compliant Chassis
JG835A HP FlexFabric 12508E DC Switch TAA-compliant Chassis
JG837A HP FlexFabric 12518E DC Switch TAA-compliant Chassis
JG803A HP FlexFabric 12500E TAA-compliant Main Processing Unit
JG796A HP FlexFabric 12500 48-port 10GbE SFP+ FD Module
JG790A HP FlexFabric 12500 16-port 40GbE QSFP+ FD Module
JG794A HP FlexFabric 12500 40-port 10GbE SFP+ FG Module
JG792A HP FlexFabric 12500 40-port 10GbE SFP+ FD Module
JG788A HP FlexFabric 12500 4-port 100GbE CFP FG Module
JG786A HP FlexFabric 12500 4-port 100GbE CFP FD Module
JG797A HP FlexFabric 12500 48-port 10GbE SFP+ FD TAA-compliant Module
JG791A HP FlexFabric 12500 16-port 40GbE QSFP+ FD TAA-compliant Module
JG795A HP FlexFabric 12500 40-port 10GbE SFP+ FG TAA-compliant Module
JG793A HP FlexFabric 12500 40-port 10GbE SFP+ FD TAA-compliant Module
JG789A HP FlexFabric 12500 4-port 100GbE CFP FG TAA-compliant Module
JG787A HP FlexFabric 12500 4-port 100GbE CFP FD TAA-compliant Module
JG798A HP FlexFabric 12508E Fabric Module
H3C S12508 Routing Switch (AC-1) (0235A0GE)
H3C S12518 Routing Switch (AC-1) (0235A0GF)
H3C S12508 Chassis (0235A0E6)
H3C S12508 Chassis (0235A38N)
H3C S12518 Chassis (0235A0E7)
H3C S12518 Chassis (0235A38M)
H3C 12508 DC Switch Chassis (0235A38L)
H3C 12518 DC Switch Chassis (0235A38K)
10500 (Comware 7)
R7168 or later
JC611A HP 10508-V Switch Chassis
JC612A HP 10508 Switch Chassis
JC613A HP 10504 Switch Chassis
JC748A HP 10512 Switch Chassis
JG820A HP 10504 TAA Switch Chassis
JG821A HP 10508 TAA Switch Chassis
JG822A HP 10508-V TAA Switch Chassis
JG823A HP 10512 TAA Switch Chassis
JG496A HP 10500 Type A MPU w/Comware v7 OS
JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
JH191A HP 10500 44-port GbE(SFP,LC)/ 4-port 10GbE SFP+ (SFP+,LC) SE Module
JH192A HP 10500 48-port Gig-T (RJ45) SE Module
JH193A HP 10500 16-port 10GbE SFP+ (SFP+,LC) SF Module
JH194A HP 10500 24-port 10GbE SFP+ (SFP+,LC) EC Module
JH195A HP 10500 6-port 40GbE QSFP+ EC Module
JH196A HP 10500 2-port 100GbE CFP EC Module
JH197A HP 10500 48-port 10GbE SFP+ (SFP+,LC) SG Module
N/A
5900 (Comware 7)
R2422P01 or later
JC772A HP 5900AF-48XG-4QSFP+ Switch
JG336A HP 5900AF-48XGT-4QSFP+ Switch
JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
JG838A HP FF 5900CP-48XG-4QSFP+ Switch
JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
JH038A) HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
N/A
5920 (Comware 7)
R2422P01 or later
JG296A HP 5920AF-24XG Switch
JG555A HP 5920AF-24XG TAA Switch
N/A
MSR1000 (Comware 7)
R0304P02 or later
JG875A HP MSR1002-4 AC Router
JH060A HP MSR1003-8S AC Router
N/A
MSR2000 (Comware 7)
R0304P02 or later
JG411A HP MSR2003 AC Router
JG734A HP MSR2004-24 AC Router
JG735A) HP MSR2004-48 Router
JG866A HP MSR2003 TAA-compliant AC Router
N/A
MSR3000 (Comware 7)
R0304P02 or later
JG404A HP MSR3064 Router
JG405A HP MSR3044 Router
JG406A HP MSR3024 AC Router
JG407A HP MSR3024 DC Router
JG408A HP MSR3024 PoE Router
JG409A HP MSR3012 AC Router
JG410A HP MSR3012 DC Router
JG861A HP MSR3024 TAA-compliant AC Router
N/A
MSR4000 (Comware 7)
R0304P02 or later
JG402A HP MSR4080 Router Chassis
JG403A HP MSR4060 Router Chassis
JG412A HP MSR4000 MPU-100 Main Processing Unit
JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
N/A
VSR (Comware 7)
E0321 or later
JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
JG811AAE HP VSR1001 Comware 7 Virtual Services Router
JG812AAE HP VSR1004 Comware 7 Virtual Services Router
JG813AAE HP VSR1008 Comware 7 Virtual Services Router
N/A
5930 (Comware 7)
R2422P01 or later
JG726A HP FlexFabric 5930 32QSFP+ Switch
JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
JH179A HP FlexFabric 5930 4-slot Switch
JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
N/A
HSR6602 (Comware 7)
R7103P05 or later
JG353A HP HSR6602-G Router
JG354A HP HSR6602-XG Router
JG776A HP HSR6602-G TAA-compliant Router
JG777A HP HSR6602-XG TAA-compliant Router
N/A
HSR6800 (Comware 7)
R7103P05 pr later
JG361A HP HSR6802 Router Chassis
JG361B HP HSR6802 Router Chassis
JG362A HP HSR6804 Router Chassis
JG362B HP HSR6804 Router Chassis
JG363A HP HSR6808 Router Chassis
JG363B HP HSR6808 Router Chassis
JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
JH075A) HP HSR6800 RSE-X3 Router Main Processing Unit
N/A
HISTORY
Version:1 (rev.1) - 18 December 2015 Initial Release
Version:2 (rev.2) - 12 January 2016 Changed name of fix R2422 to R2422P01
Version:3 (rev.3) - 29 January 2016 Added Note section in the Vulnerability
Summary
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJWq9bRAAoJEGIGBBYqRO9/SZgH/jR3sYXQXaNXUT3barkmxeIz
YfdrrBda6xUECJ4jASbbcPQRPB9v0rBdMG0xtX/y49TkTIBDPoqDygrY+imZQQ5n
rMSeLBa3+ZlsgBE9PZ3stOOR261CgP3Iymp5NJvVeFYPV8XKhcS+Zne81SSoiLqp
HpZIzQX90vZ0Oz4hXmdP2A/1yK8kjSFIe4eSTb8DdlqYtgPqqgIaY4UT8U56LrQG
FU8Q6StuZH9eOIehTkmi9nTN4fn87+NR46d16yXRTL9MHAr2gpq8mr1DRX88mTNf
/ZjYJHv1bES250S6jJZsf06BTKQwLeRg11EWpK4pYycV2emOsA11qVCZiblSSfc=
=NEGF
-----END PGP SIGNATURE-----