Summary: | <www-plugins/adobe-flash-{11.2.202.643,23.0.0.205}: possible code execution due to use-after-free | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | desktop-misc, jer |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://helpx.adobe.com/security/products/flash-player/apsb16-36.html | ||
Whiteboard: | A2 [glsa cve cleanup] | ||
Package list: | Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
![]() These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2016-7855). Acknowledgments Adobe would like to thank Neel Mehta and Billy Leonard from Google's Threat Analysis Group for reporting CVE-2016-7855 and for working with Adobe to help protect our customers. Arch teams, please test and mark stable: =www-plugins/adobe-flash-11.2.202.643 =www-plugins/adobe-flash-23.0.0.205 Targeted stable KEYWORDS : amd64 x86 amd64 stable x86 stable. Maintainer(s), please cleanup. Added to existing GLSA request This issue was resolved and addressed in GLSA 201610-10 at https://security.gentoo.org/glsa/201610-10 by GLSA coordinator Kristian Fiskerstrand (K_F). |