Bug 14506 - Security update request for flash-player-plugin, to 11.2.202.418
Summary: Security update request for flash-player-plugin, to 11.2.202.418
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://helpx.adobe.com/security/produ...
Whiteboard: MGA3TOO has_procedure advisory mga3-3...
Keywords: Security, validated_update
Depends on:
Blocks: 14456
  Show dependency treegraph
 
Reported: 2014-11-11 18:49 CET by Anssi Hannula
Modified: 2014-11-14 02:42 CET (History)
2 users (show)

See Also:
Source RPM: flash-player-plugin
CVE: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576 CVE-2014-0577 CVE-2014-0581 CVE-2014-0582 CVE-2014-0583 CVE-2014-0584 CVE-2014-0585 CVE-2014-0586 CVE-2014-0588 CVE-2014-0589 CVE-2014-0590 CVE-2014-8437 CVE-2014-8438 CVE-2014-8440 CVE-2014-8441 CVE-2014-8442
Status comment:


Attachments

Description Anssi Hannula 2014-11-11 18:49:35 CET
Advisory:
============
Adobe Flash Player 11.2.202.418 contains fixes to critical security 
vulnerabilities found in earlier versions that could potentially allow an 
attacker to take control of the affected system.

This update resolves memory corruption vulnerabilities that could lead to code execution (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).

This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).

This update resolves a double free vulnerability that could lead to code execution (CVE-2014-0574).

This update resolves type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590).

This update resolves heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589).

This update resolves an information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437).

This update resolves a heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583). 

This update resolves a permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442).

References:
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442
============

Updated Flash Player 11.2.202.418 packages are in mga3+mga4
nonfree/updates_testing.

Source packages:
flash-player-plugin-11.2.202.418-1.mga3.nonfree
flash-player-plugin-11.2.202.418-1.mga4.nonfree

Binary packages:
flash-player-plugin-11.2.202.418-1.mga3.nonfree
flash-player-plugin-kde-11.2.202.418-1.mga3.nonfree
flash-player-plugin-11.2.202.418-1.mga4.nonfree
flash-player-plugin-kde-11.2.202.418-1.mga4.nonfree
Anssi Hannula 2014-11-11 18:49:46 CET

Whiteboard: (none) => MGA3TOO

Comment 1 claire robinson 2014-11-12 11:23:04 CET
Testing complete mga4 64

tested flash still working and cleared local flash storage in kde settings.

Whiteboard: MGA3TOO => MGA3TOO has_procedure mga4-64-ok

Comment 2 David Walser 2014-11-12 11:39:27 CET
Tested fine on Mageia 3 i586 as well.

Whiteboard: MGA3TOO has_procedure mga4-64-ok => MGA3TOO has_procedure mga4-64-ok mga4-32-ok

Comment 3 Rémi Verschelde 2014-11-12 12:15:12 CET
Advisory uploaded.

Whiteboard: MGA3TOO has_procedure mga4-64-ok mga4-32-ok => MGA3TOO has_procedure mga4-64-ok mga4-32-ok advisory

Comment 4 Rémi Verschelde 2014-11-12 12:15:44 CET
@David: you said having tested on Mageia 3 i586 but added the mga4-32-ok label, could you clarify?

CC: (none) => remi

Comment 5 David Walser 2014-11-12 12:18:42 CET
Hehe, oops.  Tested Mageia 4.  Will test Mageia 3 tomorrow if nobody does first.
Comment 6 Anssi Hannula 2014-11-12 12:19:37 CET
Just realized that the previous Flash update (bug #14456) hasn't been pushed by sysadmins yet (it was validated, though), and this new version of course superseded it in the updates_testing repository...

Can the sysadmins still push the previous one (I think there is an rpm backup somewhere on the server), or should the advisory for this one be adjusted to include the stuff from #14456 as well?
Comment 7 David Walser 2014-11-12 12:27:13 CET
Ahh, yes.  The stuff from the previous update should be added to the advisory.
Comment 8 Anssi Hannula 2014-11-12 15:01:10 CET
Updated suggested advisory (if bug #14456 does not get pushed):
============
Adobe Flash Player 11.2.202.418 contains fixes to critical security 
vulnerabilities found in earlier versions that could potentially allow an 
attacker to take control of the affected system.

This update resolves memory corruption vulnerabilities that could lead to code execution (CVE-2014-0558, CVE-2014-0564, CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).

This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2014-0569).

This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).

This update resolves a double free vulnerability that could lead to code execution (CVE-2014-0574).

This update resolves type confusion vulnerabilities that could lead to code execution (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, CVE-2014-0590).

This update resolves heap buffer overflow vulnerabilities that could lead to code execution (CVE-2014-0582, CVE-2014-0589).

This update resolves an information disclosure vulnerability that could be exploited to disclose session tokens (CVE-2014-8437).

This update resolves a heap buffer overflow vulnerability that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-0583). 

This update resolves a permission issue that could be exploited to perform privilege escalation from low to medium integrity level (CVE-2014-8442).

References:
http://helpx.adobe.com/security/products/flash-player/apsb14-22.html
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0564
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442
============
Comment 9 claire robinson 2014-11-13 09:38:35 CET
Testing complete mga3 32

Whiteboard: MGA3TOO has_procedure mga4-64-ok mga4-32-ok advisory => MGA3TOO has_procedure mga3-32-ok mga4-64-ok mga4-32-ok advisory
Severity: normal => critical

Comment 10 claire robinson 2014-11-13 10:00:26 CET
Advisory updated to comment 8

Validating. 

Could sysadmin please push to 3 & 4 updates

Thanks

Whiteboard: MGA3TOO has_procedure mga3-32-ok mga4-64-ok mga4-32-ok advisory => MGA3TOO has_procedure advisory mga3-32-ok mga3-64-ok mga4-64-ok mga4-32-ok
CC: (none) => sysadmin-bugs
Keywords: (none) => validated_update

Comment 11 Mageia Robot 2014-11-14 02:28:08 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0448.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED

David Walser 2014-11-14 02:42:08 CET

Blocks: (none) => 14456


Note You need to log in before you can comment on or make changes to this bug.