|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0379 (flash-player-plugin)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0379: Updated flash-player-plugin packages fix security vulnerabilities
Date:  Mon, 21 Sep 2015 23:07:26 +0200
Message-ID:  <20150921210726.53D145C7DC@valstar.mageia.org>

MGASA-2015-0379 - Updated flash-player-plugin packages fix security vulnerabilities Publication date: 21 Sep 2015 URL: http://advisories.mageia.org/MGASA-2015-0379.html Type: security Affected Mageia releases: 5 CVE: CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682 Description: Adobe Flash Player 11.2.202.521 contains fixes to critical security vulnerabilities found in earlier versions that could potentially allow an attacker to take control of the affected system. This update resolves a type confusion vulnerability that could lead to code execution (CVE-2015-5573). This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, CVE-2015-6682). This update resolves buffer overflow vulnerabilities that could lead to code execution (CVE-2015-6676, CVE-2015-6678). This update resolves memory corruption vulnerabilities that could lead to code execution (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677). This update includes additional validation checks to ensure that Flash Player rejects malicious content from vulnerable JSONP callback APIs (CVE-2015-5571). This update resolves a memory leak vulnerability (CVE-2015-5576). This update includes further hardening to a mitigation to defend against vector length corruptions (CVE-2015-5568). This update resolves stack corruption vulnerabilities that could lead to code execution (CVE-2015-5567, CVE-2015-5579). This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2015-5587). This update resolves a security bypass vulnerability that could lead to information disclosure (CVE-2015-5572). This update resolves a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-6679). References: - https://bugs.mageia.org/show_bug.cgi?id=16792 - https://helpx.adobe.com/security/products/flash-player/ap... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5567 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5568 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5570 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5571 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5572 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5573 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5574 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5575 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5576 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5577 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5578 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5579 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5580 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5581 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5582 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5584 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5587 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5588 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6676 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6677 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6678 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6679 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6682 SRPMS: - 5/nonfree/flash-player-plugin-11.2.202.521-1.mga5.nonfree


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds