|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0228 (flash-player-plugin)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0228: Updated flash-player-plugin packages fix security vulnerabilities
Date:  Fri, 17 Jun 2016 07:58:44 +0200
Message-ID:  <20160617055844.3F57E9F752@duvel.mageia.org>

MGASA-2016-0228 - Updated flash-player-plugin packages fix security vulnerabilities Publication date: 17 Jun 2016 URL: http://advisories.mageia.org/MGASA-2016-0228.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4135, CVE-2016-4136, CVE-2016-4137, CVE-2016-4138, CVE-2016-4139, CVE-2016-4140, CVE-2016-4141, CVE-2016-4142, CVE-2016-4143, CVE-2016-4144, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148, CVE-2016-4149, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171 Description: Adobe Flash Player 11.2.202.626 contains fixes to critical security vulnerabilities found in earlier versions that could potentially allow an attacker to take control of the affected system. This update resolves type confusion vulnerabilities that could lead to code execution (CVE-2016-4144, CVE-2016-4149). This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2016-4142, CVE-2016-4143, CVE-2016-4145, CVE-2016-4146, CVE-2016-4147, CVE-2016-4148). This update resolves heap buffer overflow vulnerabilities that could lead to code execution (CVE-2016-4135, CVE-2016-4136, CVE-2016-4138). This update resolves memory corruption vulnerabilities that could lead to code execution (CVE-2016-4122, CVE-2016-4123, CVE-2016-4124, CVE-2016-4125, CVE-2016-4127, CVE-2016-4128, CVE-2016-4129, CVE-2016-4130, CVE-2016-4131, CVE-2016-4132, CVE-2016-4133, CVE-2016-4134, CVE-2016-4137, CVE-2016-4141, CVE-2016-4150, CVE-2016-4151, CVE-2016-4152, CVE-2016-4153, CVE-2016-4154, CVE-2016-4155, CVE-2016-4156, CVE-2016-4166, CVE-2016-4171). This update resolves a vulnerability in the directory search path used to find resources that could lead to code execution (CVE-2016-4140). This update resolves a vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2016-4139). Adobe reports that an exploit for CVE-2016-4171 exists in the wild. References: - https://bugs.mageia.org/show_bug.cgi?id=18720 - https://helpx.adobe.com/security/products/flash-player/ap... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4122 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4123 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4124 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4125 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4127 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4128 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4129 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4130 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4131 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4132 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4133 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4134 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4135 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4136 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4137 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4138 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4139 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4140 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4141 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4142 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4143 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4144 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4145 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4146 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4147 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4148 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4149 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4150 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4151 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4152 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4153 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4154 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4155 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4156 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4166 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4171 SRPMS: - 5/nonfree/flash-player-plugin-11.2.202.626-1.1.mga5.nonfree


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds