File _patchinfo of Package patchinfo.3801

<patchinfo incident="3801">
  <issue id="1015379" tracker="bnc">VUL-0: EMU: flash-player: december 13 release (APSB16-39)</issue>
  <issue id="2016-7879" tracker="cve" />
  <issue id="2016-7892" tracker="cve" />
  <issue id="2016-7868" tracker="cve" />
  <issue id="2016-7890" tracker="cve" />
  <issue id="2016-7880" tracker="cve" />
  <issue id="2016-7881" tracker="cve" />
  <issue id="2016-7878" tracker="cve" />
  <issue id="2016-7871" tracker="cve" />
  <issue id="2016-7870" tracker="cve" />
  <issue id="2016-7873" tracker="cve" />
  <issue id="2016-7872" tracker="cve" />
  <issue id="2016-7875" tracker="cve" />
  <issue id="2016-7867" tracker="cve" />
  <issue id="2016-7877" tracker="cve" />
  <issue id="2016-7876" tracker="cve" />
  <issue id="2016-7869" tracker="cve" />
  <issue id="2016-7874" tracker="cve" />
  <category>security</category>
  <rating>critical</rating>
  <packager>sbrabec</packager>
  <description>
This update for flash-player fixes the following issues:

- Security update to 24.0.0.186 (bsc#1015379) APSB16-39:
    * These updates resolve use-after-free vulnerabilities that could have
      lead to code execution (CVE-2016-7872, CVE-2016-7877, CVE-2016-7878,
      CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7892).
    * These updates resolve buffer overflow vulnerabilities that could have lead to
      code execution (CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870).
    * These updates resolve memory corruption vulnerabilities that could have lead to
      code execution (CVE-2016-7871, CVE-2016-7873, CVE-2016-7874,
      CVE-2016-7875, CVE-2016-7876).
    * These updates resolve a security bypass vulnerability (CVE-2016-7890).
- Keep standalone flashplayer at version 11, no newer version
  exists (INSECURE!).
- Update EULA to version 24.0.
</description>
  <summary>Security update for flash-player</summary>
</patchinfo>
openSUSE Build Service is sponsored by