ALT-BU-2014-2715-1
Branch p7 update bulletin.
Package adobe-flash-player updated to version 11-alt28 for branch p7 in task 118324.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-0506
Use-after-free vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows remote attackers to execute arbitrary code, and possibly bypass an Internet Explorer sandbox protection mechanism, via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://twitter.com/thezdi/statuses/443886338077495296
- http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://twitter.com/thezdi/statuses/443886338077495296
- http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/
Modified: 2025-04-12
CVE-2014-0507
Buffer overflow in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows attackers to execute arbitrary code via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securityfocus.com/bid/66701
- http://www.securitytracker.com/id/1030035
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securityfocus.com/bid/66701
- http://www.securitytracker.com/id/1030035
Modified: 2025-04-12
CVE-2014-0508
Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securitytracker.com/id/1030035
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securitytracker.com/id/1030035
Modified: 2025-04-12
CVE-2014-0509
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securityfocus.com/bid/66703
- http://www.securitytracker.com/id/1030035
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://www.securityfocus.com/bid/66703
- http://www.securitytracker.com/id/1030035
Package kernel-image-led-ws updated to version 3.4.87-alt1.M70P.1 for branch p7 in task 118345.
Closed vulnerabilities
Modified: 2016-11-28
BDU:2014-00061
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании
Modified: 2024-07-05
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2025-04-12
CVE-2014-0055
The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
- http://rhn.redhat.com/errata/RHSA-2014-0328.html
- http://rhn.redhat.com/errata/RHSA-2014-0339.html
- http://secunia.com/advisories/59386
- http://www.securityfocus.com/bid/66441
- https://bugzilla.redhat.com/show_bug.cgi?id=1062577
- http://rhn.redhat.com/errata/RHSA-2014-0328.html
- http://rhn.redhat.com/errata/RHSA-2014-0339.html
- http://secunia.com/advisories/59386
- http://www.securityfocus.com/bid/66441
- https://bugzilla.redhat.com/show_bug.cgi?id=1062577
Modified: 2025-04-12
CVE-2014-0077
drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8316f3991d207fe32881a9ac20241be8fa2bad0
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10
- http://www.securityfocus.com/bid/66678
- https://bugzilla.redhat.com/show_bug.cgi?id=1064440
- https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d8316f3991d207fe32881a9ac20241be8fa2bad0
- http://secunia.com/advisories/59386
- http://secunia.com/advisories/59599
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.10
- http://www.securityfocus.com/bid/66678
- https://bugzilla.redhat.com/show_bug.cgi?id=1064440
- https://github.com/torvalds/linux/commit/d8316f3991d207fe32881a9ac20241be8fa2bad0
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-09768
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2014-2525
Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
- http://advisories.mageia.org/MGASA-2014-0150.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0353.html
- http://rhn.redhat.com/errata/RHSA-2014-0354.html
- http://rhn.redhat.com/errata/RHSA-2014-0355.html
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://support.apple.com/kb/HT6443
- http://www.debian.org/security/2014/dsa-2884
- http://www.debian.org/security/2014/dsa-2885
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:060
- http://www.ocert.org/advisories/ocert-2014-003.html
- http://www.securityfocus.com/bid/66478
- http://www.ubuntu.com/usn/USN-2160-1
- https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048
- https://puppet.com/security/cve/cve-2014-2525
- http://advisories.mageia.org/MGASA-2014-0150.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html
- http://rhn.redhat.com/errata/RHSA-2014-0353.html
- http://rhn.redhat.com/errata/RHSA-2014-0354.html
- http://rhn.redhat.com/errata/RHSA-2014-0355.html
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://support.apple.com/kb/HT6443
- http://www.debian.org/security/2014/dsa-2884
- http://www.debian.org/security/2014/dsa-2885
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:060
- http://www.ocert.org/advisories/ocert-2014-003.html
- http://www.securityfocus.com/bid/66478
- http://www.ubuntu.com/usn/USN-2160-1
- https://bitbucket.org/xi/libyaml/commits/bce8b60f0b9af69fa9fab3093d0a41ba243de048
- https://puppet.com/security/cve/cve-2014-2525