Bug 15480

Summary: Security update request for flash-player-plugin, to 11.2.202.451
Product: Mageia Reporter: Anssi Hannula <anssi.hannula>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: rverschelde, sysadmin-bugs, wrw105
Version: 4Keywords: Security, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://helpx.adobe.com/security/products/flash-player/apsb15-05.html
Whiteboard: MGA4-32-OK advisory mga4-64-ok
Source RPM: flash-player-plugin CVE: CVE-2015-0332, CVE-2015-0333, CVE-2015-0334, CVE-2015-0335, CVE-2015-0336, CVE-2015-0337, CVE-2015-0338, CVE-2015-0339, CVE-2015-0340, CVE-2015-0341, CVE-2015-0342
Status comment:

Description Anssi Hannula 2015-03-12 21:40:20 CET
Advisory:
============
Adobe Flash Player 11.2.202.451 contains fixes to critical security vulnerabilities found in earlier versions that could cause a crash and potentially allow an attacker to take control of the affected system.

This update resolves memory corruption vulnerabilities that could lead to code execution (CVE-2015-0332, CVE-2015-0333, CVE-2015-0335, CVE-2015-0339).

This update resolves type confusion vulnerabilities that could lead to code execution (CVE-2015-0334, CVE-2015-0336).

This update resolves a vulnerability that could lead to a cross-domain policy bypass (CVE-2015-0337).

This update resolves a vulnerability that could lead to a file upload restriction bypass (CVE-2015-0340).

This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2015-0338).

This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2015-0341, CVE-2015-0342).

Additionally, the Flash Plugin package downloaded from Adobe is now verified using recorded sha256sum and file size instead of using insecure md5sum (Mageia bug #15229).

References:
https://helpx.adobe.com/security/products/flash-player/apsb15-05.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342
https://bugs.mageia.org/show_bug.cgi?id=15229
============

Updated Flash Player 11.2.202.451 packages are in mga4 nonfree/updates_testing.

Source packages:
flash-player-plugin-11.2.202.451-1.mga4.nonfree

Binary packages:
flash-player-plugin-11.2.202.451-1.mga4.nonfree
flash-player-plugin-kde-11.2.202.451-1.mga4.nonfree
Comment 1 David Walser 2015-03-13 00:48:41 CET
Working fine Mageia 4 i586.

Whiteboard: (none) => MGA4-32-OK

Comment 2 Rémi Verschelde 2015-03-13 11:42:35 CET
Advisory uploaded.

CC: (none) => remi
Whiteboard: MGA4-32-OK => MGA4-32-OK advisory

Comment 3 Bill Wilkinson 2015-03-14 14:00:07 CET
Tested mga4-64, watched youtube video, changed a setting in the control panel and played a game. All OK.

Validating

Can someone from the sysadmin team please push to nonfree-updates?

Keywords: (none) => validated_update
Whiteboard: MGA4-32-OK advisory => MGA4-32-OK advisory mga4-64-ok
CC: (none) => wrw105, sysadmin-bugs

Comment 4 Mageia Robot 2015-03-14 19:44:57 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0109.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED