<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">security update for flash-player</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1267-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-07-18T13:26:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-07-18T13:26:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-07-18T13:26:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">security update for flash-player</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in
     the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed
     remote attackers to execute arbitrary code or cause a denial of service
     (memory corruption) via crafted Flash content that overrides a valueOf
     function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class
     in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed
     remote attackers to execute arbitrary code or cause a denial of service
     (memory corruption) via crafted Flash content that leverages improper
     handling of the opaqueBackground property (bsc#937752).

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1267-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Evergreen 11.4">
      <Branch Type="Product Name" Name="openSUSE Evergreen 11.4">
        <FullProductName ProductID="openSUSE Evergreen 11.4">openSUSE Evergreen 11.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-11.2.202.491-173.1">
      <FullProductName ProductID="flash-player-11.2.202.491-173.1">flash-player-11.2.202.491-173.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-gnome-11.2.202.491-173.1">
      <FullProductName ProductID="flash-player-gnome-11.2.202.491-173.1">flash-player-gnome-11.2.202.491-173.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-kde4-11.2.202.491-173.1">
      <FullProductName ProductID="flash-player-kde4-11.2.202.491-173.1">flash-player-kde4-11.2.202.491-173.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flash-player-11.2.202.491-173.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:flash-player-11.2.202.491-173.1">flash-player-11.2.202.491-173.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-11.2.202.491-173.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:flash-player-gnome-11.2.202.491-173.1">flash-player-gnome-11.2.202.491-173.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-kde4-11.2.202.491-173.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:flash-player-kde4-11.2.202.491-173.1">flash-player-kde4-11.2.202.491-173.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.</Note>
    </Notes>
    <CVE>CVE-2015-5122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:flash-player-11.2.202.491-173.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:flash-player-gnome-11.2.202.491-173.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:flash-player-kde4-11.2.202.491-173.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5122.html</URL>
        <Description>CVE-2015-5122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937752</URL>
        <Description>SUSE Bug 937752</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.</Note>
    </Notes>
    <CVE>CVE-2015-5123</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:flash-player-11.2.202.491-173.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:flash-player-gnome-11.2.202.491-173.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:flash-player-kde4-11.2.202.491-173.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5123.html</URL>
        <Description>CVE-2015-5123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937752</URL>
        <Description>SUSE Bug 937752</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
