Adobe has released APSB09-19, which recommends updating to adobe-flash-10.0.42.34 or greater. APSB09-19 contains fixes for several cross-platform critical flaws, as well as a few platform specific ones. All flaws fixed by APSB09-19 are listed below: From Adobe: Critical vulnerabilities have been identified in Adobe Flash Player version 10.0.32.18 and earlier. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Flash Player 10.0.32.18 and earlier versions update to Adobe Flash Player 10.0.42.34. Adobe recommends users of Adobe AIR version 1.5.2 and earlier versions update to Adobe AIR 1.5.3. This update resolves a vulnerability in the parsing of JPEG data that could potentially lead to code execution (CVE-2009-3794). This update resolves a data injection vulnerability that could potentially lead to code execution (CVE-2009-3796). This update resolves a memory corruption vulnerability that could potentially lead to code execution (CVE-2009-3797). This update resolves a memory corruption vulnerability that could potentially lead to code execution (CVE-2009-3798). This update resolves an integer overflow vulnerability that could potentially lead to code execution (CVE-2009-3799). This update resolves multiple crash vulnerabilities that could potentially lead to code execution (CVE-2009-3800). This update resolves a Windows-only local file name access vulnerability in the Flash Player ActiveX control that could potentially lead to information disclosure (CVE-2009-3951). This updates the previously patched issue, CVE-2008-4820.
Lack, can we stabilize 10.0.42.34?
CVE-2009-3794 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3794): Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file. CVE-2009-3796 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3796): Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors, related to a "data injection vulnerability." CVE-2009-3797 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3797): Adobe Flash Player 10.x before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption. CVE-2009-3798 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3798): Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption. CVE-2009-3799 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3799): Integer overflow in the Verifier::parseExceptionHandlers function in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via an SWF file with a large exception_count value that triggers memory corruption, related to "generation of ActionScript exception handlers." CVE-2009-3800 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3800): Multiple unspecified vulnerabilities in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allow attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
(In reply to comment #1) > Lack, can we stabilize 10.0.42.34? Yes, by all means! I don't think adobe-flash has ever waited a full 30 days since normally their releases plug security holes. Maybe I should just start stable-bumping when they make their next release ;)
Arches, please test and mark stable: =www-plugins/adobe-flash-10.0.42.34 Target keywords : "amd64 x86"
amd64 stable (it's also much less crashy than current stable in my case ;-))
x86 stable
All arches stable, and I have now removed the vulnerable =www-plugins/adobe-flash/adobe-flash-10.0.32.18 from the tree.
GLSA request was already filed.
GLSA 201001-02