Risks
Advisories
Browse
or
or
SUSE Security Update - flash-player (SUSE-SU-2013:1039-1)
SUSE Security Update: Security update for flash-player
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1039-1
Rating:             important
References:         #824512
Cross-References:   CVE-2013-3343
Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes one vulnerability is now available. It
   includes one version update.

Description:


   Adobe flash-player has been updated to the 11.2.202.291
   security update  which fixes several security issues.

   Bug#824512 / CVE-2013-3343 / APSB13-16

   Security Issue reference:

   * CVE-2013-3343
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3343
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-flash-player-7850

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.291]:

      flash-player-11.2.202.291-0.3.1
      flash-player-gnome-11.2.202.291-0.3.1
      flash-player-kde4-11.2.202.291-0.3.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.291]:

      flash-player-11.2.202.291-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2013-3343.html
   https://bugzilla.novell.com/824512
  
http://download.novell.com/patch/finder/?keywords=79c597776eb65522c777c2c31d78be79
   http://download.novell.com/patch/finder/?keywords=eade46809046296377fc288dde27a404




Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //