{"id":"MGASA-2016-0315","summary":"Updated flash-player-plugin packages fix security vulnerability","details":"Adobe Flash Player 11.2.202.635 contains fixes to critical security\nvulnerabilities found in earlier versions that could potentially allow an\nattacker to take control of the affected system.\n\nThis update resolves an integer overflow vulnerability that could lead to\ncode execution (CVE-2016-4287). \n\nThis update resolves use-after-free vulnerabilities that could lead to\ncode execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921,\nCVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929,\nCVE-2016-6930, CVE-2016-6931, CVE-2016-6932). \n\nThis update resolves security bypass vulnerabilities that could lead to\ninformation disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278). \n\nThis update resolves memory corruption vulnerabilities that could lead to\ncode execution (CVE-2016-4274, CVE-2016-4275, CVE-2016-4276,\nCVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284,\nCVE-2016-4285, CVE-2016-6922, CVE-2016-6924).\n","modified":"2026-04-16T06:22:56.667367251Z","published":"2016-09-21T20:38:22Z","upstream":["CVE-2016-4271","CVE-2016-4272","CVE-2016-4274","CVE-2016-4275","CVE-2016-4276","CVE-2016-4277","CVE-2016-4278","CVE-2016-4279","CVE-2016-4280","CVE-2016-4281","CVE-2016-4282","CVE-2016-4283","CVE-2016-4284","CVE-2016-4285","CVE-2016-4287","CVE-2016-6921","CVE-2016-6922","CVE-2016-6923","CVE-2016-6924","CVE-2016-6925","CVE-2016-6926","CVE-2016-6927","CVE-2016-6929","CVE-2016-6930","CVE-2016-6931","CVE-2016-6932"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0315.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19359"},{"type":"WEB","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-29.html"}],"affected":[{"package":{"name":"flash-player-plugin","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/flash-player-plugin?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"11.2.202.635-1.mga5.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0315.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}