Summary: | <www-plugins/adobe-flash-11.2.202.577: Multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | desktop-misc, jer |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://helpx.adobe.com/security/products/flash-player/apsb16-08.html | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
![]() Adobe recommends users of Adobe Flash Player for Linux update to Adobe Flash Player 11.2.202.577 Arch teams, please test and mark stable: =www-plugins/adobe-flash-11.2.202.577 Targeted stable KEYWORDS : amd64 x86 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Added to existing GLSA request. Cleanup complete. @Jer, thanks. CVE-2016-0963 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0963): These updates resolve integer overflow vulnerabilities that could lead to code execution CVE-2016-0962 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0962): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-0961 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0961): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-0960 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0960): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-1010 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1010): These updates resolve integer overflow vulnerabilities that could lead to code execution CVE-2016-1005 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1005): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-1002 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1002): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-1001 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1001): These updates resolve a heap overflow vulnerability that could lead to code execution CVE-2016-1000 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1000): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0999 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0999): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0998 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0998): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0997 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0997): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0996 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0996): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0995 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0995): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0994 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0994): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0993 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0993): These updates resolve integer overflow vulnerabilities that could lead to code execution CVE-2016-0992 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0992): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-0991 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0991): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0990 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0990): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0989 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0989): These updates resolve memory corruption vulnerabilities that could lead to code execution CVE-2016-0988 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0988): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0987 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0987): These updates resolve use-after-free vulnerabilities that could lead to code execution CVE-2016-0986 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0986): These updates resolve memory corruption vulnerabilities that could lead to code execution This issue was resolved and addressed in GLSA 201603-07 at https://security.gentoo.org/glsa/201603-07 by GLSA coordinator Kristian Fiskerstrand (K_F). |