On Fri, 7 Oct 2011, Robert E. Blair wrote:

Dag Wieers wrote:

|  Again, without any information it is hard to determine whether the
|  plugincheck is mainly checking the version against the latest (known)
|  available, or whether it actually knows about vulnerabilities.
| | I bet the first option is what is implemented (because the second adds
|  complexity without any real gain). Their aim is to have people running
|  the latest.
| | ALso, if we look at TUV, they still offer
|  flash-plugin-10.3.183.10-1.el6, which is most likely not vulnerable (and
|  which was the version offered by Repoforge until this morning too). In
|  other words, we are now disconnected from the RHSA information.

The 64 bit version I installed an hour or so ago from the Adobe yum repo is:
flash-plugin-11.0.1.152-release.x86_64

Ok, let's hope I can kill this thread with actual vendor information instead.


On the Adobe website, there's even no mention of flash-plugin v11.

    http://www.adobe.com/support/security/#flashplayer

So as I suspected, the new v11 release is just the first official release announcement, which is *NOT* security-related. At least there is not information to support such claims, and no proof that the v10 offering is vulnerable.


Wrt. to Red Hat not tracking flash-plugin security updates.

As far as I can tell, TUV has the latest flash-plugin v10, so there is no
security impact. TUV provides flash-plugin-10.3.183.10-1.el6, which is
newer than the latest Adobe security bulletin from the Adobe page above.


Executive summary:

 - Do not mix 32bit and 64bit flash-plugin packages. Decide which to use
   and stick to it.

 - New Adobe releases do not imply new security vulnerabilities.

 - Red Hat is offering a secure flash-plugin offering (even newer than
   the latest Adobe security bulletin), even when it is not the latest and
   greatest (just-released) v11.


Please only reply to this thread if you have new information and some references to back it up.

Thanks :-)
--
-- dag wieers, [email protected], http://dag.wieers.com/
-- dagit linux solutions, [email protected], http://dagit.net/

[Any errors in spelling, tact or fact are transmission errors]

Reply via email to