Ispravljene su dvije sigurnosne ranjivosti programskog paketa flash-player. Zlonamjerni korisnik bi mogao iskoristiti nepravilnosti za pokretanje zlonamjernog programskog koda i otkrivanje povjerljivih podataka.
Prva ranjivost uzrokovana je korupcijom memorije u komponenti Matrix3D dok je druga uzrokovana lošim rukovanjem cjelobrojnim vrijednostima.
Posljedica:
Ranjivosti mogu dovesti do pokretanja proizvoljnog programskog koda i DoS napada putem nespecificiranih vektora te mogućnosti pregleda povjerljivih informacija.
Rješenje:
Svim se korisnicima preporučuje instalacija izdane nadogradnje programskog paketa.
SUSE Security Update: Security update for flash-player
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:0332-2
Rating: important
References: #750614
Cross-References: CVE-2012-0768 CVE-2012-0769
Affected Products:
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
flash-player 11.1.102.63 fixes two security issues:
* memory corruption vulnerability in Matrix3D could
lead to code executionn (CVE-2012-0768)
* integer errors that could lead to information
disclosure (CVE-2012-0769)
Security Issue references:
* CVE-2012-0768
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0768
>
* CVE-2012-0769
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0769
>
Package List:
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 10.3.183.16]:
flash-player-10.3.183.16-0.5.1
References:
http://support.novell.com/security/cve/CVE-2012-0768.html
http://support.novell.com/security/cve/CVE-2012-0769.html
https://bugzilla.novell.com/750614
http://download.novell.com/patch/finder/?keywords=e55fbfc41d02cf21b84c2963260243e6
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke