File _patchinfo of Package patchinfo.679
<patchinfo incident="679">
<packager>sbrabec</packager>
<issue tracker="cve" id="2015-3096"></issue>
<issue tracker="cve" id="2015-3098"></issue>
<issue tracker="cve" id="2015-3099"></issue>
<issue tracker="cve" id="2015-3100"></issue>
<issue tracker="cve" id="2015-3102"></issue>
<issue tracker="cve" id="2015-3103"></issue>
<issue tracker="cve" id="2015-3104"></issue>
<issue tracker="cve" id="2015-3105"></issue>
<issue tracker="cve" id="2015-3106"></issue>
<issue tracker="cve" id="2015-3107"></issue>
<issue tracker="cve" id="2015-3108"></issue>
<issue tracker="bnc" id="934088">VUL-0: flash-player: ABSP-2015-11: june flash player update 11.2.202.466</issue>
<category>security</category>
<rating>important</rating>
<summary>Security update for flash-player</summary>
<description> The following issues are fixed by this updated:
* CVE-2015-3096: These updates resolve a vulnerability that could be exploited to bypass the fix for CVE-2014-5333.
* CVE-2015-3098, CVE-2015-3099, CVE-2015-3102:These updates resolve vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure.
* CVE-2015-3100: These updates resolve a stack overflow vulnerability that could lead to code execution.
* CVE-2015-3103, CVE-2015-3106, CVE-2015-3107: These updates resolve use-after-free vulnerabilities that could lead to code execution.
* CVE-2015-3104: These updates resolve an integer overflow vulnerability that could lead to code execution.
* CVE-2015-3105: These updates resolve a memory corruption vulnerability that could lead to code execution.
* CVE-2015-3108: These updates resolve a memory leak vulnerability that could be used to bypass ASLR (CVE-2015-3108).
(bsc#934088)</description>
</patchinfo>