Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2016:0438-01] Critical: flash-plugin security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Critical: flash-plugin security update

Advisory ID: RHSA-2016:0438-01

Product: Red Hat Enterprise Linux Supplementary

Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0438.html

Issue date: 2016-03-11

CVE Names: CVE-2016-0960 CVE-2016-0961 CVE-2016-0962

CVE-2016-0963 CVE-2016-0986 CVE-2016-0987

CVE-2016-0988 CVE-2016-0989 CVE-2016-0990

CVE-2016-0991 CVE-2016-0992 CVE-2016-0993

CVE-2016-0994 CVE-2016-0995 CVE-2016-0996

CVE-2016-0997 CVE-2016-0998 CVE-2016-0999

CVE-2016-1000 CVE-2016-1001 CVE-2016-1002

CVE-2016-1005 CVE-2016-1010

=====================================================================

 

1. Summary:

 

An updated Adobe Flash Player package that fixes multiple security issues

is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.

 

Red Hat Product Security has rated this update as having Critical security

impact. Common Vulnerability Scoring System (CVSS) base scores, which give

detailed severity ratings, are available for each vulnerability from the

CVE links in the References section.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64

Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64

Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64

Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64

Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64

 

3. Description:

 

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash

Player web browser plug-in.

 

This update fixes multiple vulnerabilities in Adobe Flash Player. These

vulnerabilities, detailed in the Adobe Security Bulletin APSB16-08 listed

in the References section, could allow an attacker to create a specially

crafted SWF file that would cause flash-plugin to crash, execute arbitrary

code, or disclose sensitive information when the victim loaded a page

containing the malicious SWF content. (CVE-2016-0960, CVE-2016-0961,

CVE-2016-0962, CVE-2016-0963, CVE-2016-0986, CVE-2016-0987, CVE-2016-0988,

CVE-2016-0989, CVE-2016-0990, CVE-2016-0991, CVE-2016-0992, CVE-2016-0993,

CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998,

CVE-2016-0999, CVE-2016-1000, CVE-2016-1001, CVE-2016-1002, CVE-2016-1005,

CVE-2016-1010)

 

All users of Adobe Flash Player should install this updated package, which

upgrades Flash Player to version 11.2.202.577.

 

4. Solution:

 

Before applying this update, make sure all previously released errata

relevant to your system have been applied.

 

For details on how to apply this update, refer to:

 

https://access.redhat.com/articles/11258

 

5. Bugs fixed (https://bugzilla.redhat.com/):

 

1316809 - flash-plugin: multiple code execution issues fixed in APSB16-08

 

6. Package List:

 

Red Hat Enterprise Linux Desktop Supplementary (v. 5):

 

i386:

flash-plugin-11.2.202.577-1.el5.i386.rpm

 

x86_64:

flash-plugin-11.2.202.577-1.el5.i386.rpm

 

Red Hat Enterprise Linux Server Supplementary (v. 5):

 

i386:

flash-plugin-11.2.202.577-1.el5.i386.rpm

 

x86_64:

flash-plugin-11.2.202.577-1.el5.i386.rpm

 

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

 

i386:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

x86_64:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

Red Hat Enterprise Linux Server Supplementary (v. 6):

 

i386:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

x86_64:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

 

i386:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

x86_64:

flash-plugin-11.2.202.577-1.el6_7.i686.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://access.redhat.com/security/team/key/

 

7. References:

 

https://access.redhat.com/security/cve/CVE-2016-0960

https://access.redhat.com/security/cve/CVE-2016-0961

https://access.redhat.com/security/cve/CVE-2016-0962

https://access.redhat.com/security/cve/CVE-2016-0963

https://access.redhat.com/security/cve/CVE-2016-0986

https://access.redhat.com/security/cve/CVE-2016-0987

https://access.redhat.com/security/cve/CVE-2016-0988

https://access.redhat.com/security/cve/CVE-2016-0989

https://access.redhat.com/security/cve/CVE-2016-0990

https://access.redhat.com/security/cve/CVE-2016-0991

https://access.redhat.com/security/cve/CVE-2016-0992

https://access.redhat.com/security/cve/CVE-2016-0993

https://access.redhat.com/security/cve/CVE-2016-0994

https://access.redhat.com/security/cve/CVE-2016-0995

https://access.redhat.com/security/cve/CVE-2016-0996

https://access.redhat.com/security/cve/CVE-2016-0997

https://access.redhat.com/security/cve/CVE-2016-0998

https://access.redhat.com/security/cve/CVE-2016-0999

https://access.redhat.com/security/cve/CVE-2016-1000

https://access.redhat.com/security/cve/CVE-2016-1001

https://access.redhat.com/security/cve/CVE-2016-1002

https://access.redhat.com/security/cve/CVE-2016-1005

https://access.redhat.com/security/cve/CVE-2016-1010

https://access.redhat.com/security/updates/classification/#critical

https://helpx.adobe.com/security/products/flash-player/apsb16-08.html

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://access.redhat.com/security/team/contact/

 

Copyright 2016 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1

 

iD8DBQFW4xBVXlSAg2UNWIIRAkCgAKCHw64puWPWdM5cVPU2vBI1mHZyFgCeI2Rx

fg/pDiOCh9x1HJhk/a+BDeA=

=4hyN

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×