These updates harden a mitigation against JIT spraying attacks that
could be used to bypass memory layout randomization mitigations.
These updates resolve type confusion vulnerabilities that could lead to
code execution.
These updates resolve use-after-free vulnerabilities that could lead to
code execution.
These updates resolve memory corruption vulnerabilities that could lead
to code execution.
These updates resolve a stack overflow vulnerability that could lead to
code execution.
These updates resolve a security bypass vulnerability.
These updates resolve a vulnerability in the directory search path used
to find resources that could lead to code execution.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
any | any | any | flashplugin | < 11.2.202.616-1 | UNKNOWN |
access.redhat.com/security/cve/CVE-2016-1006
access.redhat.com/security/cve/CVE-2016-1011
access.redhat.com/security/cve/CVE-2016-1012
access.redhat.com/security/cve/CVE-2016-1013
access.redhat.com/security/cve/CVE-2016-1014
access.redhat.com/security/cve/CVE-2016-1015
access.redhat.com/security/cve/CVE-2016-1016
access.redhat.com/security/cve/CVE-2016-1017
access.redhat.com/security/cve/CVE-2016-1018
access.redhat.com/security/cve/CVE-2016-1019
access.redhat.com/security/cve/CVE-2016-1020
access.redhat.com/security/cve/CVE-2016-1021
access.redhat.com/security/cve/CVE-2016-1022
access.redhat.com/security/cve/CVE-2016-1023
access.redhat.com/security/cve/CVE-2016-1024
access.redhat.com/security/cve/CVE-2016-1025
access.redhat.com/security/cve/CVE-2016-1026
access.redhat.com/security/cve/CVE-2016-1027
access.redhat.com/security/cve/CVE-2016-1028
access.redhat.com/security/cve/CVE-2016-1029
access.redhat.com/security/cve/CVE-2016-1030
access.redhat.com/security/cve/CVE-2016-1031
access.redhat.com/security/cve/CVE-2016-1032
access.redhat.com/security/cve/CVE-2016-1033
helpx.adobe.com/security/products/flash-player/apsa16-01.html
helpx.adobe.com/security/products/flash-player/apsb16-10.html