ALT-BU-2014-2602-1
Branch sisyphus update bulletin.
Package adobe-flash-player updated to version 11-alt26 for branch sisyphus in task 114960.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-0498
Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0278
- openSUSE-SU-2014:0278
- SUSE-SU-2014:0290
- SUSE-SU-2014:0290
- RHSA-2014:0196
- RHSA-2014:0196
- GLSA-201405-04
- GLSA-201405-04
Modified: 2024-11-21
CVE-2014-0499
Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 do not prevent access to address information, which makes it easier for attackers to bypass the ASLR protection mechanism via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0278
- openSUSE-SU-2014:0278
- SUSE-SU-2014:0290
- SUSE-SU-2014:0290
- RHSA-2014:0196
- RHSA-2014:0196
- GLSA-201405-04
- GLSA-201405-04
Modified: 2024-12-20
CVE-2014-0502
Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014.
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0277
- openSUSE-SU-2014:0278
- openSUSE-SU-2014:0278
- SUSE-SU-2014:0290
- SUSE-SU-2014:0290
- RHSA-2014:0196
- RHSA-2014:0196
- GLSA-201405-04
- GLSA-201405-04
- http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/
- http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/
- https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html
- https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html
Package kernel-image-un-def updated to version 3.13.4-alt1 for branch sisyphus in task 114943.
Closed vulnerabilities
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2024-11-21
CVE-2014-1874
The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- 59262
- 59262
- 59309
- 59309
- 59406
- 59406
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.4
- [oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
- [oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
- 65459
- 65459
- USN-2128-1
- USN-2128-1
- USN-2129-1
- USN-2129-1
- USN-2133-1
- USN-2133-1
- USN-2134-1
- USN-2134-1
- USN-2135-1
- USN-2135-1
- USN-2136-1
- USN-2136-1
- USN-2137-1
- USN-2137-1
- USN-2138-1
- USN-2138-1
- USN-2139-1
- USN-2139-1
- USN-2140-1
- USN-2140-1
- USN-2141-1
- USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1062356
- https://bugzilla.redhat.com/show_bug.cgi?id=1062356
- https://github.com/torvalds/linux/commit/2172fa709ab32ca60e86179dc67d0857be8e2c98
- https://github.com/torvalds/linux/commit/2172fa709ab32ca60e86179dc67d0857be8e2c98
Modified: 2024-11-21
CVE-2015-4170
Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae
- [oss-security] 20150526 CVE request: vulnerability in the kernel tty subsystem.
- [oss-security] 20150526 CVE request: vulnerability in the kernel tty subsystem.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74820
- 74820
- RHSA-2016:1395
- RHSA-2016:1395
- https://bugzilla.redhat.com/show_bug.cgi?id=1218879
- https://bugzilla.redhat.com/show_bug.cgi?id=1218879
- https://github.com/torvalds/linux/commit/cf872776fc84128bb779ce2b83a37c884c3203ae
- https://github.com/torvalds/linux/commit/cf872776fc84128bb779ce2b83a37c884c3203ae
- https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz
- https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz