You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa flash-plugin

Sigurnosni nedostatak programskog paketa flash-plugin

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2020:4251-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4251
Issue date: 2020-10-14
CVE Names: CVE-2020-9746
=====================================================================

1. Summary:

An update for flash-plugin is now available for Red Hat Enterprise Linux 6
Supplementary.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop Supplementary (v. 6) – i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) – i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) – i386, x86_64

3. Description:

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.

This update upgrades Flash Player to version 32.0.0.445.

Security Fix(es):

* flash-plugin: Arbitrary Code Execution vulnerability (APSB20-58)
(CVE-2020-9746)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1888018 – CVE-2020-9746 flash-plugin: Arbitrary Code Execution vulnerability (APSB20-58)

6. Package List:

Red Hat Enterprise Linux Desktop Supplementary (v. 6):

i386:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

x86_64:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

Red Hat Enterprise Linux Server Supplementary (v. 6):

i386:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

x86_64:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

Red Hat Enterprise Linux Workstation Supplementary (v. 6):

i386:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

x86_64:
flash-plugin-32.0.0.445-1.el6_10.i686.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-9746
https://access.redhat.com/security/updates/classification/#critical
https://protect2.fireeye.com/v1/url?k=aa07507a-f615e47e-aa00cdb6-000babd90757-30730c3e385a836d&q=1&e=4c8a53e1-dd9c-4193-b7bc-2031634921af&u=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fflash-player%2Fapsb20-58.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=tNq/
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Top
More in Preporuke
Nadogradnja za Microsoft Windows

Nadogradnja za Microsoft Windows. Pronađene su ranjivosti koje potencijalnim napadačima omogućuju stjecanje uvećanih ovlasti, izvršavanje proizvoljnog programskog koda, izazivanje DoS...

Close