Summary: | <www-plugins/adobe-flash-11.2.202.491 : Multiple vulnerabilities allowing for ACE and DoS (CVE-2015-{5122,5123}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alexander Bezrukov <phmagic> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | desktop-misc, frederik.schmid, ftobin, ikelos, Ikonta, jer, redneb |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://helpx.adobe.com/security/products/flash-player/apsa15-04.html | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Alexander Bezrukov
2015-07-14 11:37:29 UTC
Security bulletin for release: https://helpx.adobe.com/security/products/flash-player/apsb15-18.html Adobe will provide an update for Flash Player for Linux during the week of July 12. The update will be available by visiting the Adobe Flash Player Download Center. Please continue to monitor the PSIRT blog for updates. Please do not update security bugs in a way that conflicts with https://wiki.gentoo.org/wiki/Project:Security/GLSA_Coordinator_Guide#Bug_summary_rules www-plugins/chrome-binary-plugins-43.0.2357.132_p1 (with Flash 18.0.0.204) is also affected according to [1]. Should we add its maintainers to CC and the package to the title or make a dedicated ticket? (If so, it would have the other CVE for an alias so on hits either of them when searching.) [1] https://helpx.adobe.com/security/products/flash-player/apsb15-18.html Adobe has issued a new APSB [1] with links to the update for the www-plugins/chrome-binary-plugins (new version is 18.0.0.209). Update for the generic linux version is still pending. [1]: https://helpx.adobe.com/security/products/flash-player/apsb15-18.html Version 11.2.202.491 is now released upstream (In reply to Sebastian Pipping from comment #3) > www-plugins/chrome-binary-plugins-43.0.2357.132_p1 (with Flash 18.0.0.204) > is also affected according to [1]. Should we add its maintainers to CC and > the package to the title or make a dedicated ticket? (If so, it would have > the other CVE for an alias so on hits either of them when searching.) > > > [1] https://helpx.adobe.com/security/products/flash-player/apsb15-18.html Please file a separate report for this, include the CVE in the summary, it will show up in searches (searches are normally performed in the form "CVE 2015 XXXX" this also picks up the string expansion variants). You don't have to set the alias for it. CVE-2015-5123 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123): Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a ValueOf function, as exploited in the wild in July 2015. CVE-2015-5122 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122): Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015. Arch teams, please test and mark stable: =www-plugins/adobe-flash-11.2.202.491 Targeted stable KEYWORDS : amd64 x86 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. This issue was resolved and addressed in GLSA 201508-01 at https://security.gentoo.org/glsa/201508-01 by GLSA coordinator Yury German (BlueKnight). This issue was resolved and addressed in GLSA 201508-01 at https://security.gentoo.org/glsa/201508-01 by GLSA coordinator Yury German (BlueKnight). This issue was resolved and addressed in GLSA 201508-01 at https://security.gentoo.org/glsa/201508-01 by GLSA coordinator Yury German (BlueKnight). |