suse-su-2016:1826-1
Vulnerability from csaf_suse
Published
2016-07-20 12:53
Modified
2016-07-20 12:53
Summary
Security update for flash-player
Notes
Title of the patch
Security update for flash-player
Description of the patch
Adobe Flash Player was updated to 11.2.202.632 to fix many security issues tracked under the upstream advisory APSB16-25, allowing remote attackers to execute arbitrary code when delivering specially crafted Flash content.
The following vulnerabilities were fixed:
- CVE-2016-4172: memory corruption vulnerability that could lead to code execution
- CVE-2016-4173: use-after-free vulnerability that could lead to code execution
- CVE-2016-4174: use-after-free vulnerability that could lead to code execution
- CVE-2016-4175: memory corruption vulnerability that could lead to code execution
- CVE-2016-4176: stack corruption vulnerability that could lead to code execution
- CVE-2016-4177: stack corruption vulnerability that could lead to code execution
- CVE-2016-4178: security bypass vulnerability that could lead to information disclosure
- CVE-2016-4179: memory corruption vulnerability that could lead to code execution
- CVE-2016-4180: memory corruption vulnerability that could lead to code execution
- CVE-2016-4181: memory corruption vulnerability that could lead to code execution
- CVE-2016-4182: memory corruption vulnerability that could lead to code execution
- CVE-2016-4183: memory corruption vulnerability that could lead to code execution
- CVE-2016-4184: memory corruption vulnerability that could lead to code execution
- CVE-2016-4185: memory corruption vulnerability that could lead to code execution
- CVE-2016-4186: memory corruption vulnerability that could lead to code execution
- CVE-2016-4187: memory corruption vulnerability that could lead to code execution
- CVE-2016-4188: memory corruption vulnerability that could lead to code execution
- CVE-2016-4189: memory corruption vulnerability that could lead to code execution
- CVE-2016-4190: memory corruption vulnerability that could lead to code execution
- CVE-2016-4217: memory corruption vulnerability that could lead to code execution
- CVE-2016-4218: memory corruption vulnerability that could lead to code execution
- CVE-2016-4219: memory corruption vulnerability that could lead to code execution
- CVE-2016-4220: memory corruption vulnerability that could lead to code execution
- CVE-2016-4221: memory corruption vulnerability that could lead to code execution
- CVE-2016-4222: use-after-free vulnerability that could lead to code execution
- CVE-2016-4223: type confusion vulnerability that could lead to code execution
- CVE-2016-4224: type confusion vulnerability that could lead to code execution
- CVE-2016-4225: type confusion vulnerability that could lead to code execution
- CVE-2016-4226: use-after-free vulnerability that could lead to code execution
- CVE-2016-4227: use-after-free vulnerability that could lead to code execution
- CVE-2016-4228: use-after-free vulnerability that could lead to code execution
- CVE-2016-4229: use-after-free vulnerability that could lead to code execution
- CVE-2016-4230: use-after-free vulnerability that could lead to code execution
- CVE-2016-4231: use-after-free vulnerability that could lead to code execution
- CVE-2016-4232: memory leak vulnerability
- CVE-2016-4233: memory corruption vulnerability that could lead to code execution
- CVE-2016-4234: memory corruption vulnerability that could lead to code execution
- CVE-2016-4235: memory corruption vulnerability that could lead to code execution
- CVE-2016-4236: memory corruption vulnerability that could lead to code execution
- CVE-2016-4237: memory corruption vulnerability that could lead to code execution
- CVE-2016-4238: memory corruption vulnerability that could lead to code execution
- CVE-2016-4239: memory corruption vulnerability that could lead to code execution
- CVE-2016-4240: memory corruption vulnerability that could lead to code execution
- CVE-2016-4241: memory corruption vulnerability that could lead to code execution
- CVE-2016-4242: memory corruption vulnerability that could lead to code execution
- CVE-2016-4243: memory corruption vulnerability that could lead to code execution
- CVE-2016-4244: memory corruption vulnerability that could lead to code execution
- CVE-2016-4245: memory corruption vulnerability that could lead to code execution
- CVE-2016-4246: memory corruption vulnerability that could lead to code execution
- CVE-2016-4247: race condition vulnerability that could lead to information disclosure
- CVE-2016-4248: use-after-free vulnerability that could lead to code execution
- CVE-2016-4249: heap buffer overflow vulnerability that could lead to code execution
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1073,SUSE-SLE-WE-12-SP1-2016-1073
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for flash-player", "title": "Title of the patch" }, { "category": "description", "text": "Adobe Flash Player was updated to 11.2.202.632 to fix many security issues tracked under the upstream advisory APSB16-25, allowing remote attackers to execute arbitrary code when delivering specially crafted Flash content. \n\nThe following vulnerabilities were fixed:\n\n- CVE-2016-4172: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4173: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4174: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4175: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4176: stack corruption vulnerability that could lead to code execution\n- CVE-2016-4177: stack corruption vulnerability that could lead to code execution\n- CVE-2016-4178: security bypass vulnerability that could lead to information disclosure\n- CVE-2016-4179: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4180: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4181: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4182: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4183: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4184: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4185: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4186: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4187: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4188: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4189: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4190: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4217: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4218: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4219: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4220: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4221: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4222: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4223: type confusion vulnerability that could lead to code execution\n- CVE-2016-4224: type confusion vulnerability that could lead to code execution\n- CVE-2016-4225: type confusion vulnerability that could lead to code execution\n- CVE-2016-4226: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4227: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4228: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4229: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4230: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4231: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4232: memory leak vulnerability\n- CVE-2016-4233: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4234: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4235: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4236: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4237: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4238: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4239: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4240: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4241: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4242: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4243: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4244: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4245: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4246: memory corruption vulnerability that could lead to code execution\n- CVE-2016-4247: race condition vulnerability that could lead to information disclosure\n- CVE-2016-4248: use-after-free vulnerability that could lead to code execution\n- CVE-2016-4249: heap buffer overflow vulnerability that could lead to code execution", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1073,SUSE-SLE-WE-12-SP1-2016-1073", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1826-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1826-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161826-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1826-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-July/002160.html" }, { "category": "self", "summary": "SUSE Bug 988579", "url": "https://bugzilla.suse.com/988579" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4172 page", "url": "https://www.suse.com/security/cve/CVE-2016-4172/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4173 page", "url": "https://www.suse.com/security/cve/CVE-2016-4173/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4174 page", "url": "https://www.suse.com/security/cve/CVE-2016-4174/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4175 page", "url": "https://www.suse.com/security/cve/CVE-2016-4175/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4176 page", "url": "https://www.suse.com/security/cve/CVE-2016-4176/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4177 page", "url": "https://www.suse.com/security/cve/CVE-2016-4177/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4178 page", "url": "https://www.suse.com/security/cve/CVE-2016-4178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4179 page", "url": "https://www.suse.com/security/cve/CVE-2016-4179/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4180 page", "url": "https://www.suse.com/security/cve/CVE-2016-4180/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4181 page", "url": "https://www.suse.com/security/cve/CVE-2016-4181/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4182 page", "url": "https://www.suse.com/security/cve/CVE-2016-4182/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4183 page", "url": "https://www.suse.com/security/cve/CVE-2016-4183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4184 page", "url": "https://www.suse.com/security/cve/CVE-2016-4184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4185 page", "url": "https://www.suse.com/security/cve/CVE-2016-4185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4186 page", "url": "https://www.suse.com/security/cve/CVE-2016-4186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4187 page", "url": "https://www.suse.com/security/cve/CVE-2016-4187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4188 page", "url": "https://www.suse.com/security/cve/CVE-2016-4188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4189 page", "url": "https://www.suse.com/security/cve/CVE-2016-4189/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4190 page", "url": "https://www.suse.com/security/cve/CVE-2016-4190/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4217 page", "url": "https://www.suse.com/security/cve/CVE-2016-4217/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4218 page", "url": "https://www.suse.com/security/cve/CVE-2016-4218/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4219 page", "url": "https://www.suse.com/security/cve/CVE-2016-4219/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4220 page", "url": "https://www.suse.com/security/cve/CVE-2016-4220/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4221 page", "url": "https://www.suse.com/security/cve/CVE-2016-4221/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4222 page", "url": "https://www.suse.com/security/cve/CVE-2016-4222/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4223 page", "url": "https://www.suse.com/security/cve/CVE-2016-4223/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4224 page", "url": "https://www.suse.com/security/cve/CVE-2016-4224/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4225 page", "url": "https://www.suse.com/security/cve/CVE-2016-4225/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4226 page", "url": "https://www.suse.com/security/cve/CVE-2016-4226/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4227 page", "url": "https://www.suse.com/security/cve/CVE-2016-4227/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4228 page", "url": "https://www.suse.com/security/cve/CVE-2016-4228/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4229 page", "url": "https://www.suse.com/security/cve/CVE-2016-4229/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4230 page", "url": "https://www.suse.com/security/cve/CVE-2016-4230/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4231 page", "url": "https://www.suse.com/security/cve/CVE-2016-4231/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4232 page", "url": "https://www.suse.com/security/cve/CVE-2016-4232/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4233 page", "url": "https://www.suse.com/security/cve/CVE-2016-4233/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4234 page", "url": "https://www.suse.com/security/cve/CVE-2016-4234/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4235 page", "url": "https://www.suse.com/security/cve/CVE-2016-4235/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4236 page", "url": "https://www.suse.com/security/cve/CVE-2016-4236/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4237 page", "url": "https://www.suse.com/security/cve/CVE-2016-4237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4238 page", "url": "https://www.suse.com/security/cve/CVE-2016-4238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4239 page", "url": "https://www.suse.com/security/cve/CVE-2016-4239/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4240 page", "url": "https://www.suse.com/security/cve/CVE-2016-4240/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4241 page", "url": "https://www.suse.com/security/cve/CVE-2016-4241/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4242 page", "url": "https://www.suse.com/security/cve/CVE-2016-4242/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4243 page", "url": "https://www.suse.com/security/cve/CVE-2016-4243/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4244 page", "url": "https://www.suse.com/security/cve/CVE-2016-4244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4245 page", "url": "https://www.suse.com/security/cve/CVE-2016-4245/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4246 page", "url": "https://www.suse.com/security/cve/CVE-2016-4246/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4247 page", "url": "https://www.suse.com/security/cve/CVE-2016-4247/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4248 page", "url": "https://www.suse.com/security/cve/CVE-2016-4248/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4249 page", "url": "https://www.suse.com/security/cve/CVE-2016-4249/" } ], "title": "Security update for flash-player", "tracking": { "current_release_date": "2016-07-20T12:53:00Z", "generator": { "date": "2016-07-20T12:53:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1826-1", "initial_release_date": "2016-07-20T12:53:00Z", "revision_history": [ { "date": "2016-07-20T12:53:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "flash-player-11.2.202.632-137.1.x86_64", "product": { "name": "flash-player-11.2.202.632-137.1.x86_64", "product_id": "flash-player-11.2.202.632-137.1.x86_64" } }, { "category": "product_version", "name": "flash-player-gnome-11.2.202.632-137.1.x86_64", "product": { "name": "flash-player-gnome-11.2.202.632-137.1.x86_64", "product_id": "flash-player-gnome-11.2.202.632-137.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-player-11.2.202.632-137.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64" }, "product_reference": "flash-player-11.2.202.632-137.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-gnome-11.2.202.632-137.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" }, "product_reference": "flash-player-gnome-11.2.202.632-137.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-11.2.202.632-137.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64" }, "product_reference": "flash-player-11.2.202.632-137.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-gnome-11.2.202.632-137.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" }, "product_reference": "flash-player-gnome-11.2.202.632-137.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4172" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4172", "url": "https://www.suse.com/security/cve/CVE-2016-4172" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4172", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4172" }, { "cve": "CVE-2016-4173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4173" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4173", "url": "https://www.suse.com/security/cve/CVE-2016-4173" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4173", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4173" }, { "cve": "CVE-2016-4174", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4174" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4174", "url": "https://www.suse.com/security/cve/CVE-2016-4174" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4174", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4174" }, { "cve": "CVE-2016-4175", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4175" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4175", "url": "https://www.suse.com/security/cve/CVE-2016-4175" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4175", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4175" }, { "cve": "CVE-2016-4176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4176" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4177.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4176", "url": "https://www.suse.com/security/cve/CVE-2016-4176" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4176", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4176" }, { "cve": "CVE-2016-4177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4177" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4176.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4177", "url": "https://www.suse.com/security/cve/CVE-2016-4177" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4177", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4177" }, { "cve": "CVE-2016-4178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4178" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4178", "url": "https://www.suse.com/security/cve/CVE-2016-4178" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4178", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4178" }, { "cve": "CVE-2016-4179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4179" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4179", "url": "https://www.suse.com/security/cve/CVE-2016-4179" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4179", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4179" }, { "cve": "CVE-2016-4180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4180" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4180", "url": "https://www.suse.com/security/cve/CVE-2016-4180" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4180", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4180" }, { "cve": "CVE-2016-4181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4181" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4181", "url": "https://www.suse.com/security/cve/CVE-2016-4181" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4181", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4181" }, { "cve": "CVE-2016-4182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4182" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4182", "url": "https://www.suse.com/security/cve/CVE-2016-4182" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4182", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4182", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4182" }, { "cve": "CVE-2016-4183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4183" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4183", "url": "https://www.suse.com/security/cve/CVE-2016-4183" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4183", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4183" }, { "cve": "CVE-2016-4184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4184" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4184", "url": "https://www.suse.com/security/cve/CVE-2016-4184" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4184", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4184" }, { "cve": "CVE-2016-4185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4185" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4185", "url": "https://www.suse.com/security/cve/CVE-2016-4185" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4185", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4185" }, { "cve": "CVE-2016-4186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4186" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4186", "url": "https://www.suse.com/security/cve/CVE-2016-4186" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4186", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4186" }, { "cve": "CVE-2016-4187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4187" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4187", "url": "https://www.suse.com/security/cve/CVE-2016-4187" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4187", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4187" }, { "cve": "CVE-2016-4188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4188" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4188", "url": "https://www.suse.com/security/cve/CVE-2016-4188" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4188", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4188" }, { "cve": "CVE-2016-4189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4189" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4189", "url": "https://www.suse.com/security/cve/CVE-2016-4189" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4189", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4189" }, { "cve": "CVE-2016-4190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4190" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4190", "url": "https://www.suse.com/security/cve/CVE-2016-4190" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4190", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4190" }, { "cve": "CVE-2016-4217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4217" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4217", "url": "https://www.suse.com/security/cve/CVE-2016-4217" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4217", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4217" }, { "cve": "CVE-2016-4218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4218" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4218", "url": "https://www.suse.com/security/cve/CVE-2016-4218" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4218", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4218" }, { "cve": "CVE-2016-4219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4219" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4219", "url": "https://www.suse.com/security/cve/CVE-2016-4219" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4219", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4219" }, { "cve": "CVE-2016-4220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4220" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4220", "url": "https://www.suse.com/security/cve/CVE-2016-4220" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4220", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4220" }, { "cve": "CVE-2016-4221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4221" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4221", "url": "https://www.suse.com/security/cve/CVE-2016-4221" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4221", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4221" }, { "cve": "CVE-2016-4222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4222" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4222", "url": "https://www.suse.com/security/cve/CVE-2016-4222" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4222", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4222" }, { "cve": "CVE-2016-4223", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4223" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified \"type confusion,\" a different vulnerability than CVE-2016-4224 and CVE-2016-4225.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4223", "url": "https://www.suse.com/security/cve/CVE-2016-4223" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4223", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4223" }, { "cve": "CVE-2016-4224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4224" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified \"type confusion,\" a different vulnerability than CVE-2016-4223 and CVE-2016-4225.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4224", "url": "https://www.suse.com/security/cve/CVE-2016-4224" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4224", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4224" }, { "cve": "CVE-2016-4225", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4225" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified \"type confusion,\" a different vulnerability than CVE-2016-4223 and CVE-2016-4224.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4225", "url": "https://www.suse.com/security/cve/CVE-2016-4225" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4225", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4225" }, { "cve": "CVE-2016-4226", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4226" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4226", "url": "https://www.suse.com/security/cve/CVE-2016-4226" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4226", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4226" }, { "cve": "CVE-2016-4227", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4227" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4227", "url": "https://www.suse.com/security/cve/CVE-2016-4227" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4227", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4227" }, { "cve": "CVE-2016-4228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4228" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4228", "url": "https://www.suse.com/security/cve/CVE-2016-4228" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4228", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4228" }, { "cve": "CVE-2016-4229", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4229" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4229", "url": "https://www.suse.com/security/cve/CVE-2016-4229" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4229", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4229" }, { "cve": "CVE-2016-4230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4230" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4231, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4230", "url": "https://www.suse.com/security/cve/CVE-2016-4230" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4230", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4230" }, { "cve": "CVE-2016-4231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4231" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4248.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4231", "url": "https://www.suse.com/security/cve/CVE-2016-4231" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4231", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4231" }, { "cve": "CVE-2016-4232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4232" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information from process memory via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4232", "url": "https://www.suse.com/security/cve/CVE-2016-4232" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4232", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4232" }, { "cve": "CVE-2016-4233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4233" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4233", "url": "https://www.suse.com/security/cve/CVE-2016-4233" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4233", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4233" }, { "cve": "CVE-2016-4234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4234" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4234", "url": "https://www.suse.com/security/cve/CVE-2016-4234" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4234", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4234" }, { "cve": "CVE-2016-4235", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4235" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4235", "url": "https://www.suse.com/security/cve/CVE-2016-4235" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4235", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4235" }, { "cve": "CVE-2016-4236", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4236" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4236", "url": "https://www.suse.com/security/cve/CVE-2016-4236" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4236", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4236" }, { "cve": "CVE-2016-4237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4237" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4237", "url": "https://www.suse.com/security/cve/CVE-2016-4237" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4237", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4237", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4237" }, { "cve": "CVE-2016-4238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4238" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4238", "url": "https://www.suse.com/security/cve/CVE-2016-4238" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4238", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4238", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4238" }, { "cve": "CVE-2016-4239", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4239" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4239", "url": "https://www.suse.com/security/cve/CVE-2016-4239" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4239", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4239" }, { "cve": "CVE-2016-4240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4240" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4240", "url": "https://www.suse.com/security/cve/CVE-2016-4240" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4240", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4240" }, { "cve": "CVE-2016-4241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4241" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4241", "url": "https://www.suse.com/security/cve/CVE-2016-4241" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4241", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4241" }, { "cve": "CVE-2016-4242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4242" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4242", "url": "https://www.suse.com/security/cve/CVE-2016-4242" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4242", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4242" }, { "cve": "CVE-2016-4243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4243" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4243", "url": "https://www.suse.com/security/cve/CVE-2016-4243" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4243", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4243" }, { "cve": "CVE-2016-4244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4244" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4244", "url": "https://www.suse.com/security/cve/CVE-2016-4244" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4244", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4244" }, { "cve": "CVE-2016-4245", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4245" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4245", "url": "https://www.suse.com/security/cve/CVE-2016-4245" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4245", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4245" }, { "cve": "CVE-2016-4246", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4246" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4245.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4246", "url": "https://www.suse.com/security/cve/CVE-2016-4246" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4246", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4246" }, { "cve": "CVE-2016-4247", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4247" } ], "notes": [ { "category": "general", "text": "Race condition in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4247", "url": "https://www.suse.com/security/cve/CVE-2016-4247" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4247", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4247" }, { "cve": "CVE-2016-4248", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4248" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4231.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4248", "url": "https://www.suse.com/security/cve/CVE-2016-4248" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4248", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4248" }, { "cve": "CVE-2016-4249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4249" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4249", "url": "https://www.suse.com/security/cve/CVE-2016-4249" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4249", "url": "https://bugzilla.suse.com/988579" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.632-137.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.632-137.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-07-20T12:53:00Z", "details": "important" } ], "title": "CVE-2016-4249" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…