Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Tech ARP] BIOS Option Of The Week - I/O Interface Security

Recommended Posts

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Gentoo Linux Security Advisory GLSA 201505-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

https://security.gentoo.org/

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Severity: Normal

Title: Adobe Flash Player: Multiple vulnerabilities

Date: May 31, 2015

Bugs: #549388

ID: 201505-02

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 

Synopsis

========

 

Multiple vulnerabilities have been found in Adobe Flash Player, the

worst of which allows remote attackers to execute arbitrary code.

 

Background

==========

 

The Adobe Flash Player is a renderer for the SWF file format, which is

commonly used to provide interactive websites.

 

Affected packages

=================

 

-------------------------------------------------------------------

Package / Vulnerable / Unaffected

-------------------------------------------------------------------

1 www-plugins/adobe-flash < 11.2.202.460 >= 11.2.202.460

 

Description

===========

 

Multiple vulnerabilities have been discovered in Adobe Flash Player.

Please review the CVE identifiers referenced below for details.

 

Impact

======

 

A remote attacker could possibly execute arbitrary code with the

privileges of the process, cause a Denial of Service condition, obtain

sensitive information, or bypass security restrictions.

 

Workaround

==========

 

There is no known workaround at this time.

 

Resolution

==========

 

All Adobe Flash Player users should upgrade to the latest version:

 

# emerge --sync

# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.460"

 

References

==========

 

[ 1 ] CVE-2015-3044

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3044

[ 2 ] CVE-2015-3077

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3077

[ 3 ] CVE-2015-3078

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3078

[ 4 ] CVE-2015-3079

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3079

[ 5 ] CVE-2015-3080

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3080

[ 6 ] CVE-2015-3081

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3081

[ 7 ] CVE-2015-3082

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3082

[ 8 ] CVE-2015-3083

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3083

[ 9 ] CVE-2015-3084

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3084

[ 10 ] CVE-2015-3085

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3085

[ 11 ] CVE-2015-3086

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3086

[ 12 ] CVE-2015-3087

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3087

[ 13 ] CVE-2015-3088

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3088

[ 14 ] CVE-2015-3089

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3089

[ 15 ] CVE-2015-3090

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3090

[ 16 ] CVE-2015-3091

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3091

[ 17 ] CVE-2015-3092

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3092

[ 18 ] CVE-2015-3093

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3093

 

Availability

============

 

This GLSA and any updates to it are available for viewing at

the Gentoo Security Website:

 

https://security.gentoo.org/glsa/201505-02

 

Concerns?

=========

 

Security is a primary focus of Gentoo Linux and ensuring the

confidentiality and security of our users' machines is of utmost

importance to us. Any security concerns should be addressed to

security ( -at -) gentoo.org or alternatively, you may file a bug at

https://bugs.gentoo.org.

 

License

=======

 

Copyright 2015 Gentoo Foundation, Inc; referenced text

belongs to its owner(s).

 

The contents of this document are licensed under the

Creative Commons - Attribution / Share Alike license.

 

http://creativecommons.org/licenses/by-sa/2.5

 

 

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×