Upstream has already released v18.104.22.168. No information available yet.
These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2017-3071).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-3068, CVE-2017-3069, CVE-2017-3070, CVE-2017-3072, CVE-2017-3073, CVE-2017-3074).
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Jihui Lu of Tencent KeenLab (CVE-2017-3069, CVE-2017-3070, CVE-2017-3071, CVE-2017-3072, CVE-2017-3073, CVE-2017-3074)
Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero (CVE-2017-3068)
Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Maintainer(s), Thank you for your work.
New GLSA Request filed.
Maintainer(s), please drop the vulnerable version(s).
This issue was resolved and addressed in
GLSA 201705-12 at https://security.gentoo.org/glsa/201705-12
by GLSA coordinator Thomas Deutschmann (whissi).