A new update is available for Red Hat Enterprise Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2009:1658-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1658.html
Issue date: 2009-12-09
CVE Names: CVE-2009-3794 CVE-2009-3796 CVE-2009-3798
CVE-2009-3799 CVE-2009-3800
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 3 Extras and 4 Extras.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Desktop version 3 Extras - i386
Red Hat Desktop version 4 Extras - i386
Red Hat Enterprise Linux AS version 3 Extras - i386
Red Hat Enterprise Linux AS version 4 Extras - i386
Red Hat Enterprise Linux ES version 3 Extras - i386
Red Hat Enterprise Linux ES version 4 Extras - i386
Red Hat Enterprise Linux WS version 3 Extras - i386
Red Hat Enterprise Linux WS version 4 Extras - i386
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in.
Multiple security flaws were found in the way Flash Player displayed
certain SWF content. An attacker could use these flaws to create a
specially-crafted SWF file that would cause flash-plugin to crash or,
possibly, execute arbitrary code when the victim loaded a page containing
the specially-crafted SWF content. (CVE-2009-3794, CVE-2009-3796,
CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 9.0.260.0.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
543857 - flash-plugin: multiple code execution flaws (APSB09-19) (CVE-2009-3794, CVE-2009-3796, CVE-2009-3797, CVE-2009-3798, CVE-2009-3799, CVE-2009-3800)
6. Package List:
Red Hat Enterprise Linux AS version 3 Extras:
i386:
flash-plugin-9.0.260.0-1.el3.with.oss.i386.rpm
Red Hat Desktop version 3 Extras:
i386:
flash-plugin-9.0.260.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux ES version 3 Extras:
i386:
flash-plugin-9.0.260.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux WS version 3 Extras:
i386:
flash-plugin-9.0.260.0-1.el3.with.oss.i386.rpm
Red Hat Enterprise Linux AS version 4 Extras:
i386:
flash-plugin-9.0.260.0-1.el4.i386.rpm
Red Hat Desktop version 4 Extras:
i386:
flash-plugin-9.0.260.0-1.el4.i386.rpm
Red Hat Enterprise Linux ES version 4 Extras:
i386:
flash-plugin-9.0.260.0-1.el4.i386.rpm
Red Hat Enterprise Linux WS version 4 Extras:
i386:
flash-plugin-9.0.260.0-1.el4.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3794
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3796
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3799
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3800
http://www.redhat.com/security/updates/classification/#critical
http://www.adobe.com/support/security/bulletins/apsb09-19.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLH9D/XlSAg2UNWIIRAlb5AKC4DVISiRXmGH36zVo/HAmYIVGZFQCdGen1
YbCE13nSy+uAopAemET0yvM=
=SHt6
-----END PGP SIGNATURE-----