{"id":"RHSA-2017:0057","summary":"Red Hat Security Advisory: flash-plugin security update","modified":"2026-01-14T11:02:24.106921Z","published":"2024-09-13T13:37:13Z","upstream":["CVE-2017-2925","CVE-2017-2926","CVE-2017-2927","CVE-2017-2928","CVE-2017-2930","CVE-2017-2931","CVE-2017-2932","CVE-2017-2933","CVE-2017-2934","CVE-2017-2935","CVE-2017-2936","CVE-2017-2937","CVE-2017-2938"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0057"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://helpx.adobe.com/security/products/flash-player/apsb17-02.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1411929"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0057.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2925"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2925"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2925"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2926"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2926"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2926"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2927"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2927"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2927"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2928"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2930"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2930"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2930"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2931"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2931"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2931"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2932"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2932"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2933"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2933"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2933"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2934"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2934"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2934"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2935"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2935"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2936"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2937"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2937"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2937"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2938"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2938"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2938"}],"affected":[{"package":{"name":"flash-plugin","ecosystem":"Red Hat:rhel_extras:6","purl":"pkg:rpm/redhat/flash-plugin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:24.0.0.194-1.el6_8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:0057.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}