| Summary: | Security update request for flash-player-plugin, to 11.2.202.262 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Anssi Hannula <anssi.hannula> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, oe, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | Security, validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| Whiteboard: | MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | flash-player-plugin | CVE: | |
| Status comment: | |||
|
Description
Anssi Hannula
2013-02-07 23:38:55 CET
Testing complete on Mageia 2 i586 and x86_64. Could someone from the sysadmin team push the srpm flash-player-plugin-11.2.202.262-1.mga2.nonfree.src.rpm from Mageia 2 Nonfree Updates Testing to Nonfree Updates. Advisory: Adobe Flash Player 11.2.202.262 contains fixes to critical security vulnerabilities found in earlier versions. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2013-0633). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2013-0634). These vulnerabilities are already being exploited in the wild against Windows and Macintosh systems. References: http://www.adobe.com/support/security/bulletins/apsb13-04.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0633 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0634 https://bugs.mageia.org/show_bug.cgi?id=8994 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0042 Status:
NEW =>
RESOLVED |