Risks
Advisories
Browse
or
or
SUSE Security Update - flash-player (SUSE-SU-2013:0798-1)
SUSE Security Update: Security update for flash-player
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0798-1
Rating:             important
References:         #819916
Cross-References:   CVE-2013-2728 CVE-2013-3324 CVE-2013-3325
                    CVE-2013-3326 CVE-2013-3327 CVE-2013-3328
                    CVE-2013-3329 CVE-2013-3330 CVE-2013-3331
                    CVE-2013-3332 CVE-2013-3333 CVE-2013-3334
                    CVE-2013-3335
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 13 vulnerabilities is now available.
   It includes one version update.

Description:


   Adobe flash-player has been updated to 11.2.202.285
   security update, which  fixes various remote code execution
   problems and other security issues.

   Some more details can be found on:
   https://www.adobe.com/support/security/bulletins/apsb13-14.h
   tml
   <https://www.adobe.com/support/security/bulletins/apsb13-14.
   html>

   Security Issue references:

   * CVE-2013-2728
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2728
   >
   * CVE-2013-3324
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3324
   >
   * CVE-2013-3325
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3325
   >
   * CVE-2013-3326
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3326
   >
   * CVE-2013-3327
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3327
   >
   * CVE-2013-3328
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3328
   >
   * CVE-2013-3329
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3329
   >
   * CVE-2013-3330
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3330
   >
   * CVE-2013-3331
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3331
   >
   * CVE-2013-3332
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3332
   >
   * CVE-2013-3333
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3333
   >
   * CVE-2013-3334
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3334
   >
   * CVE-2013-3335
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3335
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-flash-player-7720

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.285]:

      flash-player-11.2.202.285-0.3.1
      flash-player-gnome-11.2.202.285-0.3.1
      flash-player-kde4-11.2.202.285-0.3.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.285]:

      flash-player-11.2.202.285-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2013-2728.html
   http://support.novell.com/security/cve/CVE-2013-3324.html
   http://support.novell.com/security/cve/CVE-2013-3325.html
   http://support.novell.com/security/cve/CVE-2013-3326.html
   http://support.novell.com/security/cve/CVE-2013-3327.html
   http://support.novell.com/security/cve/CVE-2013-3328.html
   http://support.novell.com/security/cve/CVE-2013-3329.html
   http://support.novell.com/security/cve/CVE-2013-3330.html
   http://support.novell.com/security/cve/CVE-2013-3331.html
   http://support.novell.com/security/cve/CVE-2013-3332.html
   http://support.novell.com/security/cve/CVE-2013-3333.html
   http://support.novell.com/security/cve/CVE-2013-3334.html
   http://support.novell.com/security/cve/CVE-2013-3335.html
   https://bugzilla.novell.com/819916
  
http://download.novell.com/patch/finder/?keywords=460e0e068724ce3d5f1345bed40fcfc1
   http://download.novell.com/patch/finder/?keywords=a5fa8585bb27b34c11c4dca03b7743de




Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //