<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for flash-player</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0108-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-01-11T16:33:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-01-11T16:33:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-01-11T16:33:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for flash-player</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Adobe Flash 24.0.0.194 fixes the following vulnerabilities advised under APSB17-02:

- security bypass vulnerability that could lead to information disclosure (CVE-2017-2938)
- use-after-free vulnerabilities that could lead to code execution (CVE-2017-2932, CVE-2017-2936, CVE-2017-2937)
- heap buffer overflow vulnerabilities that could lead to code execution
  (CVE-2017-2927, CVE-2017-2933, CVE-2017-2934, CVE-2017-2935)
- memory corruption vulnerabilities that could lead to code execution
  (CVE-2017-2925, CVE-2017-2926, CVE-2017-2928, CVE-2017-2930, CVE-2017-2931)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP1-2017-51,SUSE-SLE-WE-12-SP1-2017-51</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      <Description>Link for SUSE-SU-2017:0108-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00013.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0108-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1019129</URL>
      <Description>SUSE Bug 1019129</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2925/</URL>
      <Description>SUSE CVE CVE-2017-2925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2926/</URL>
      <Description>SUSE CVE CVE-2017-2926 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2927/</URL>
      <Description>SUSE CVE CVE-2017-2927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2928/</URL>
      <Description>SUSE CVE CVE-2017-2928 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2930/</URL>
      <Description>SUSE CVE CVE-2017-2930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2931/</URL>
      <Description>SUSE CVE CVE-2017-2931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2932/</URL>
      <Description>SUSE CVE CVE-2017-2932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2933/</URL>
      <Description>SUSE CVE CVE-2017-2933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2934/</URL>
      <Description>SUSE CVE CVE-2017-2934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2935/</URL>
      <Description>SUSE CVE CVE-2017-2935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2936/</URL>
      <Description>SUSE CVE CVE-2017-2936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2937/</URL>
      <Description>SUSE CVE CVE-2017-2937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-2938/</URL>
      <Description>SUSE CVE CVE-2017-2938 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1" CPE="cpe:/o:suse:sle-we:12:sp1">SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-24.0.0.194-155.1">
      <FullProductName ProductID="flash-player-24.0.0.194-155.1">flash-player-24.0.0.194-155.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-gnome-24.0.0.194-155.1">
      <FullProductName ProductID="flash-player-gnome-24.0.0.194-155.1">flash-player-gnome-24.0.0.194-155.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flash-player-24.0.0.194-155.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1">flash-player-24.0.0.194-155.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-24.0.0.194-155.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1">flash-player-gnome-24.0.0.194-155.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-24.0.0.194-155.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1">flash-player-24.0.0.194-155.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-24.0.0.194-155.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1">flash-player-gnome-24.0.0.194-155.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability in the JPEG XR codec. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2925.html</URL>
        <Description>CVE-2017-2925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2926.html</URL>
        <Description>CVE-2017-2926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2927.html</URL>
        <Description>CVE-2017-2927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2928.html</URL>
        <Description>CVE-2017-2928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2930.html</URL>
        <Description>CVE-2017-2930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to the parsing of SWF metadata. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2931.html</URL>
        <Description>CVE-2017-2931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript MovieClip class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2932.html</URL>
        <Description>CVE-2017-2932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2933.html</URL>
        <Description>CVE-2017-2933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2934.html</URL>
        <Description>CVE-2017-2934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2935.html</URL>
        <Description>CVE-2017-2935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2936.html</URL>
        <Description>CVE-2017-2936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2017-2937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2937.html</URL>
        <Description>CVE-2017-2937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 24.0.0.186 and earlier have a security bypass vulnerability related to handling TCP connections.</Note>
    </Notes>
    <CVE>CVE-2017-2938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.194-155.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.194-155.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170108-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-2938.html</URL>
        <Description>CVE-2017-2938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019129</URL>
        <Description>SUSE Bug 1019129</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
