Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
patchinfo.3203
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.3203
<patchinfo incident="3203"> <packager>AndreasStieger</packager> <issue tracker="cve" id="2016-4182"></issue> <issue tracker="cve" id="2016-4237"></issue> <issue tracker="cve" id="2016-4238"></issue> <issue tracker="cve" id="2016-4271"></issue> <issue tracker="cve" id="2016-4272"></issue> <issue tracker="cve" id="2016-4274"></issue> <issue tracker="cve" id="2016-4275"></issue> <issue tracker="cve" id="2016-4276"></issue> <issue tracker="cve" id="2016-4277"></issue> <issue tracker="cve" id="2016-4278"></issue> <issue tracker="cve" id="2016-4279"></issue> <issue tracker="cve" id="2016-4280"></issue> <issue tracker="cve" id="2016-4281"></issue> <issue tracker="cve" id="2016-4282"></issue> <issue tracker="cve" id="2016-4283"></issue> <issue tracker="cve" id="2016-4284"></issue> <issue tracker="cve" id="2016-4285"></issue> <issue tracker="cve" id="2016-4287"></issue> <issue tracker="cve" id="2016-6921"></issue> <issue tracker="cve" id="2016-6922"></issue> <issue tracker="cve" id="2016-6923"></issue> <issue tracker="cve" id="2016-6924"></issue> <issue tracker="cve" id="2016-6925"></issue> <issue tracker="cve" id="2016-6926"></issue> <issue tracker="cve" id="2016-6927"></issue> <issue tracker="cve" id="2016-6929"></issue> <issue tracker="cve" id="2016-6930"></issue> <issue tracker="cve" id="2016-6931"></issue> <issue tracker="cve" id="2016-6932"></issue> <issue tracker="bnc" id="998589">VUL-0: flash-player: version update 11.2.202.635</issue> <category>security</category> <rating>important</rating> <summary>Security update for flash-player</summary> <description>This update for flash-player fixes the following security issues (APSB16-29, boo#998589): - integer overflow vulnerability that could lead to code execution (CVE-2016-4287). - use-after-free vulnerabilities that could lead to code execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932) - security bypass vulnerabilities that could lead to information disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278) - memory corruption vulnerabilities that could lead to code execution (CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, CVE-2016-6924) </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor