<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for flash-player</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:3148-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-14T10:10:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-14T10:10:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-14T10:10:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for flash-player</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for flash-player fixes the following issues:

- Security update to 24.0.0.186 (bsc#1015379) APSB16-39:
    * These updates resolve use-after-free vulnerabilities that could have
      lead to code execution (CVE-2016-7872, CVE-2016-7877, CVE-2016-7878,
      CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7892).
    * These updates resolve buffer overflow vulnerabilities that could have lead to
      code execution (CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870).
    * These updates resolve memory corruption vulnerabilities that could have lead to
      code execution (CVE-2016-7871, CVE-2016-7873, CVE-2016-7874,
      CVE-2016-7875, CVE-2016-7876).
    * These updates resolve a security bypass vulnerability (CVE-2016-7890).
- Keep standalone flashplayer at version 11, no newer version
  exists (INSECURE!).
- Update EULA to version 24.0.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP1-2016-1816,SUSE-SLE-WE-12-SP1-2016-1816</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      <Description>Link for SUSE-SU-2016:3148-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:3148-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015379</URL>
      <Description>SUSE Bug 1015379</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7867/</URL>
      <Description>SUSE CVE CVE-2016-7867 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7868/</URL>
      <Description>SUSE CVE CVE-2016-7868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7869/</URL>
      <Description>SUSE CVE CVE-2016-7869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7870/</URL>
      <Description>SUSE CVE CVE-2016-7870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7871/</URL>
      <Description>SUSE CVE CVE-2016-7871 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7872/</URL>
      <Description>SUSE CVE CVE-2016-7872 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7873/</URL>
      <Description>SUSE CVE CVE-2016-7873 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7874/</URL>
      <Description>SUSE CVE CVE-2016-7874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7875/</URL>
      <Description>SUSE CVE CVE-2016-7875 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7876/</URL>
      <Description>SUSE CVE CVE-2016-7876 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7877/</URL>
      <Description>SUSE CVE CVE-2016-7877 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7878/</URL>
      <Description>SUSE CVE CVE-2016-7878 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7879/</URL>
      <Description>SUSE CVE CVE-2016-7879 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7880/</URL>
      <Description>SUSE CVE CVE-2016-7880 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7881/</URL>
      <Description>SUSE CVE CVE-2016-7881 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7890/</URL>
      <Description>SUSE CVE CVE-2016-7890 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7892/</URL>
      <Description>SUSE CVE CVE-2016-7892 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1" CPE="cpe:/o:suse:sle-we:12:sp1">SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-24.0.0.186-152.1">
      <FullProductName ProductID="flash-player-24.0.0.186-152.1">flash-player-24.0.0.186-152.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="flash-player-gnome-24.0.0.186-152.1">
      <FullProductName ProductID="flash-player-gnome-24.0.0.186-152.1">flash-player-gnome-24.0.0.186-152.1</FullProductName>
    </Branch>
    <Relationship ProductReference="flash-player-24.0.0.186-152.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1">flash-player-24.0.0.186-152.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-24.0.0.186-152.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1">flash-player-gnome-24.0.0.186-152.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-24.0.0.186-152.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1">flash-player-24.0.0.186-152.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="flash-player-gnome-24.0.0.186-152.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1">flash-player-gnome-24.0.0.186-152.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7867.html</URL>
        <Description>CVE-2016-7867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7868.html</URL>
        <Description>CVE-2016-7868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to backtrack search functionality. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7869.html</URL>
        <Description>CVE-2016-7869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7870.html</URL>
        <Description>CVE-2016-7870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7871.html</URL>
        <Description>CVE-2016-7871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class related to objects at multiple presentation levels. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7872</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7872.html</URL>
        <Description>CVE-2016-7872</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7873</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7873.html</URL>
        <Description>CVE-2016-7873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7874.html</URL>
        <Description>CVE-2016-7874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7875</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7875.html</URL>
        <Description>CVE-2016-7875</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Clipboard class related to data handling functionality. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7876</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7876.html</URL>
        <Description>CVE-2016-7876</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the Action Message Format serialization (AFM0). Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7877</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7877.html</URL>
        <Description>CVE-2016-7877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the PSDK's MediaPlayer class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7878</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7878.html</URL>
        <Description>CVE-2016-7878</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7879</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7879.html</URL>
        <Description>CVE-2016-7879</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability when setting the length property of an array object. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7880</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7880.html</URL>
        <Description>CVE-2016-7880</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7881</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7881.html</URL>
        <Description>CVE-2016-7881</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have security bypass vulnerability in the implementation of the same origin policy.</Note>
    </Notes>
    <CVE>CVE-2016-7890</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7890.html</URL>
        <Description>CVE-2016-7890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2016-7892</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-24.0.0.186-152.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-24.0.0.186-152.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163148-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7892.html</URL>
        <Description>CVE-2016-7892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015379</URL>
        <Description>SUSE Bug 1015379</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
