<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for flash-player</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0703-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-03-15T14:21:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-03-15T14:21:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-03-15T14:21:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for flash-player</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for flash-player fixes the following issues:

Security update to 25.0.0.127 (bsc#1029374), fixing the following vulnerabilities advised under APSB17-07:
- CVE-2017-2997: This update resolves a buffer overflow vulnerability that could lead to code execution.
- CVE-2017-2998, CVE-2017-2999: This update resolves memory corruption vulnerabilities that could lead to
  code execution.
- CVE-2017-3000: This update resolves a random number generator vulnerability used for constant blinding
  that could lead to information disclosure.
- CVE-2017-3001, CVE-2017-3002, CVE-2017-3003: This update resolves use-after-free vulnerabilities that
  could lead to code execution.
- Details:
  https://helpx.adobe.com/security/products/flash-player/apsb17-07.html
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP1-2017-385,SUSE-SLE-WE-12-SP1-2017-385</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      <Description>Link for SUSE-SU-2017:0703-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-March/002698.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0703-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1029374</URL>
      <Description>SUSE Bug 1029374</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2997/</URL>
      <Description>SUSE CVE CVE-2017-2997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2998/</URL>
      <Description>SUSE CVE CVE-2017-2998 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2999/</URL>
      <Description>SUSE CVE CVE-2017-2999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3000/</URL>
      <Description>SUSE CVE CVE-2017-3000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3001/</URL>
      <Description>SUSE CVE CVE-2017-3001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3002/</URL>
      <Description>SUSE CVE CVE-2017-3002 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-3003/</URL>
      <Description>SUSE CVE CVE-2017-3003 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1" CPE="cpe:/o:suse:sle-we:12:sp1">SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-25.0.0.127-162.1">
      <FullProductName ProductID="flash-player-25.0.0.127-162.1">flash-player-25.0.0.127-162.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-gnome-25.0.0.127-162.1">
      <FullProductName ProductID="flash-player-gnome-25.0.0.127-162.1">flash-player-gnome-25.0.0.127-162.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flash-player-25.0.0.127-162.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1">flash-player-25.0.0.127-162.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-25.0.0.127-162.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1">flash-player-gnome-25.0.0.127-162.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-25.0.0.127-162.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1">flash-player-25.0.0.127-162.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-25.0.0.127-162.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1">flash-player-gnome-25.0.0.127-162.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2997.html</URL>
        <Description>CVE-2017-2997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2998</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2998.html</URL>
        <Description>CVE-2017-2998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2999.html</URL>
        <Description>CVE-2017-2999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.</Note>
    </Notes>
    <CVE>CVE-2017-3000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3000.html</URL>
        <Description>CVE-2017-3000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-3001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3001.html</URL>
        <Description>CVE-2017-3001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-3002</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3002.html</URL>
        <Description>CVE-2017-3002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-3003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-25.0.0.127-162.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-25.0.0.127-162.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170703-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-3003.html</URL>
        <Description>CVE-2017-3003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029374</URL>
        <Description>SUSE Bug 1029374</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
