{"id":"RHSA-2016:0438","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2025-11-22T11:08:29Z","published":"2024-09-13T12:26:33Z","upstream":["CVE-2016-0960","CVE-2016-0961","CVE-2016-0962","CVE-2016-0963","CVE-2016-0986","CVE-2016-0987","CVE-2016-0988","CVE-2016-0989","CVE-2016-0990","CVE-2016-0991","CVE-2016-0992","CVE-2016-0993","CVE-2016-0994","CVE-2016-0995","CVE-2016-0996","CVE-2016-0997","CVE-2016-0998","CVE-2016-0999","CVE-2016-1000","CVE-2016-1001","CVE-2016-1002","CVE-2016-1005","CVE-2016-1010"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:0438"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-08.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1316809"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0438.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0960"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0960"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0960"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0961"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0961"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0961"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0962"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0962"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0963"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0963"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0963"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0986"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0986"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0986"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0987"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0987"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0987"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0988"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0988"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0988"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0989"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0989"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0989"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0990"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0990"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0990"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0991"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0991"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0991"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0992"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0992"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0992"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0993"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0993"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0993"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0994"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0994"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0994"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0995"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0995"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0995"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0996"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0996"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0996"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0997"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0997"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0997"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0998"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0998"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0998"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-0999"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-0999"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0999"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1000"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1000"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1000"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1001"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1001"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1001"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1002"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1002"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1002"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1005"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1005"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1005"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-1010"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-1010"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1010"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::client","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.577-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0438.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:5::server","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.577-1.el5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0438.json"}},{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:11.2.202.577-1.el6_7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:0438.json"}}],"schema_version":"1.7.3"}