Multiple Memory corruption vulnerabilities that could lead to arbitrary
code execution have been found. These vulnerabilities were discovered by
Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero, willJ of
Tencent PC Manager, Yuki Chen of Qihoo 360 Vulcan Team,
<a href=“https://lists.archlinux.org/listinfo/arch-security”>b0nd at garage4hackers</a> working with Trend Micro’s Zero Day Initiative, and
Tao Yan (@Ga1ois) of Palo Alto Networks
Multiple use-after-free vulnerabilities that could lead to arbitrary
code execution have been found. These vulnerabilities have been
discovered by, Mumei working with Trend Micro’s Zero Day Initiative,
Yuki Chen of Qihoo 360 Vulcan Team working with the Chromium
Vulnerability Rewards Program, willJ of Tencent PC Manager, JieZeng of
Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards
Program, Nicolas Joly of Microsoft Vulnerability Research, and Yuki Chen
of Qihoo 360 Vulcan Team
An integer overflow vulnerability that could lead to arbitrary code
execution has been found. This vulnerability has been discovered by Yuki
Chen of Qihoo 360 Vulcan Team working with the Chromium Vulnerability
Rewards Program.
A Security bypass vulnerablity that could lead to information disclosure
has been found. These vulnerabilities have been found by Leone
Pontorieri, Soroush Dalili and Matthew Evans from NCC Group, and Nicolas
Joly of Microsoft Vulnerability Research
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
any | any | any | flashplugin | < 11.2.202.635-1 | UNKNOWN |
access.redhat.com/security/cve/CVE-2016-4271
access.redhat.com/security/cve/CVE-2016-4272
access.redhat.com/security/cve/CVE-2016-4274
access.redhat.com/security/cve/CVE-2016-4275
access.redhat.com/security/cve/CVE-2016-4276
access.redhat.com/security/cve/CVE-2016-4277
access.redhat.com/security/cve/CVE-2016-4278
access.redhat.com/security/cve/CVE-2016-4279
access.redhat.com/security/cve/CVE-2016-4280
access.redhat.com/security/cve/CVE-2016-4281
access.redhat.com/security/cve/CVE-2016-4282
access.redhat.com/security/cve/CVE-2016-4283
access.redhat.com/security/cve/CVE-2016-4284
access.redhat.com/security/cve/CVE-2016-4285
access.redhat.com/security/cve/CVE-2016-4287
access.redhat.com/security/cve/CVE-2016-6921
access.redhat.com/security/cve/CVE-2016-6922
access.redhat.com/security/cve/CVE-2016-6923
access.redhat.com/security/cve/CVE-2016-6924
access.redhat.com/security/cve/CVE-2016-6925
access.redhat.com/security/cve/CVE-2016-6926
access.redhat.com/security/cve/CVE-2016-6927
access.redhat.com/security/cve/CVE-2016-6929
access.redhat.com/security/cve/CVE-2016-6930
access.redhat.com/security/cve/CVE-2016-6931
access.redhat.com/security/cve/CVE-2016-6932
helpx.adobe.com/security/products/flash-player/apsb16-29.html