"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: flash-plugin security update
Advisory ID: RHSA-2010:0103-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0103.html
Issue date: 2010-02-12
CVE Names: CVE-2010-0186
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes a security issue is now
available for Red Hat Enterprise Linux 3 and 4 Extras.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Desktop version 3 Extras - i386
Red Hat Desktop version 4 Extras - i386
Red Hat Enterprise Linux AS version 3 Extras - i386
Red Hat Enterprise Linux AS version 4 Extras - i386
Red Hat Enterprise Linux ES version 3 Extras - i386
Red Hat Enterprise Linux ES version 4 Extras - i386
Red Hat Enterprise Linux WS version 3 Extras - i386
Red Hat Enterprise Linux WS version 4 Extras - i386
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.
This update fixes a vulnerability in Adobe Flash Player. This vulnerability
is summarized on the Adobe Security Advisory APSB10-06 page listed in the
References section. If a victim loaded a web page containing
specially-crafted SWF content, it could cause Flash Player to perform
unauthorized cross-domain requests, leading to the disclosure of sensitive
data. (CVE-2010-0186)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 9.0.262.0.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
563819 - CVE-2010-0186 flash-plugin: unauthorized cross-domain requests (APSB10-06)
6. Package List:
Red Hat Enterprise Linux AS version 3 Extras:
i386:
flash-plugin-9.0.262.0-1.el3.with.oss.i386.rpm
Red Hat Desktop version 3 Extras:
i386:
flash-plugin-9.0.262.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux ES version 3 Extras:
i386:
flash-plugin-9.0.262.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux WS version 3 Extras:
i386:
flash-plugin-9.0.262.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux AS version 4 Extras:
i386:
flash-plugin-9.0.262.0-1.el4.i386.rpm
Red Hat Desktop version 4 Extras:
i386:
flash-plugin-9.0.262.0-1.el4.i386.rpm
Red Hat Enterprise Linux ES version 4 Extras:
i386:
flash-plugin-9.0.262.0-1.el4.i386.rpm
Red Hat Enterprise Linux WS version 4 Extras:
i386:
flash-plugin-9.0.262.0-1.el4.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-0186.html
http://www.redhat.com/security/updates/classification/#important
http://www.adobe.com/support/security/bulletins/apsb10-06.html
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLdYFrXlSAg2UNWIIRAsOgAJ4zlNMduZJ7eWABXriSrhXP9erRQgCeMICN
OKux50bQ7TTqg218JYLtiGo=
=t9bL
-----END PGP SIGNATURE-----
"
Ronnie James Dio cancer updateRHSA-2010:0102-01 Important: flash-plugin security update
This entry was posted
on 4:23 PM
.
Archives
-
▼
2010
(391)
-
▼
February
(42)
- USN-905-1: sudo vulnerabilities
- RHSA-2010:0115-01 Moderate: pidgin security update
- RHSA-2010:0122-01 Important: sudo security update
- USN-904-1: Squid vulnerability
- DSA 2003-1: New Linux 2.6.18 packages fix several ...
- DSA-2002-1: New polipo packages fix denial of service
- RHSA-2010:0114-01 Critical: acroread security and ...
- USN-902-1: Pidgin vulnerabilities
- DSA 1999-1: New xulrunner packages fix several vul...
- USN-895-1: Firefox 3.0 and Xulrunner 1.9 vulnerabi...
- USN-890-5: XML-RPC for C and C++ vulnerabilities
- DSA 2000-1: New ffmpeg packages fix several vulner...
- RHSA-2010:0110-01 Moderate: mysql security update
- RHSA-2010:0115-01 Moderate: pidgin security update
- USN-896-1: Firefox 3.5 and Xulrunner 1.9.1 vulnera...
- RHSA-2010:0112-01 Critical: firefox security update
- RHSA-2010:0113-01 Critical: seamonkey security update
- DSA 1998-1: New kdelibs packages fix arbitrary cod...
- RHSA-2010:0108-01 Moderate: NetworkManager securit...
- USN-900-1: Ruby vulnerabilities
- USN-898-1: gnome-screensaver vulnerability
- RHSA-2010:0103-01 Important: flash-plugin security...
- DSA-1997-1: New mysql-dfsg-5.0 packages fix severa...
- DSA 1994-1: New ajaxterm packages fix session hija...
- RHSA-2010:0102-01 Important: flash-plugin security...
- USN-897-1: MySQL vulnerabilities
- USN-899-1: Tomcat vulnerabilities
- DSA 1992-1: New chrony packages fix denial of service
- DSA 1993-1: New otrs2 packages fix SQL injection
- RHSA-2010:0094-02 Critical: HelixPlayer security u...
- RHSA-2010:0079-01 Important: kernel security and b...
- DSA 1986-1: New moodle packages fix several vulner...
- DSA 1991-1: New squid/squid3 packages fix denial o...
- RHSA-2010:0088-02 Important: kvm security and bug ...
- DSA-1989-1: New fuse packages fix denial of service
- DSA 1841-2: New git-core packages fix build failure
- DSA 1987-1: New lighttpd packages fix denial of se...
- DSA 1983-1: New Wireshark packages fix several vul...
- DSA-1990-2: New trac-git package fixes regression
- DSA-1990-1: New trac-git packages fix code execution
- DSA 1982-1: New hybserv packages fix denial of ser...
- DSA 1968-2: New pdns-recursor packages fix cache p...
-
▼
February
(42)