An update for flash-plugin is now available for Red Hat Enterprise Linux 5Supplementary and Red Hat Enterprise Linux 6 Supplementary.Red Hat Product Security has rated this update as having a security impact ofCritical.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The flash-plugin package contains a Mozilla Firefox compatible Adobe FlashPlayer web browser plug-in.This update upgrades Flash Player to version 11.2.202.643.Security Fix(es):* This update fixes one vulnerability in Adobe Flash Player.

This vulnerability,detailed in the Adobe Security Bulletin listed in the References section, couldallow an attacker to create a specially crafted SWF file that would causeflash-plugin to crash, execute arbitrary code, or disclose sensitive informationwhen the victim loaded a page containing the malicious SWF content.(CVE-2016-7855)
RHEL Desktop Supplementary (v. 5 client)

IA-32:
flash-plugin-11.2.202.643-1.el5_11.i386.rpm
    MD5: 063a5ff6c347727308e087e9a85df5daSHA-256: ad43fff7ef84175fda8a523734f7dffdc64e6c5e83d0f296b6e95185822daada
 
x86_64:
flash-plugin-11.2.202.643-1.el5_11.i386.rpm
    MD5: 063a5ff6c347727308e087e9a85df5daSHA-256: ad43fff7ef84175fda8a523734f7dffdc64e6c5e83d0f296b6e95185822daada
 
RHEL Supplementary (v. 5 server)

IA-32:
flash-plugin-11.2.202.643-1.el5_11.i386.rpm
    MD5: 063a5ff6c347727308e087e9a85df5daSHA-256: ad43fff7ef84175fda8a523734f7dffdc64e6c5e83d0f296b6e95185822daada
 
x86_64:
flash-plugin-11.2.202.643-1.el5_11.i386.rpm
    MD5: 063a5ff6c347727308e087e9a85df5daSHA-256: ad43fff7ef84175fda8a523734f7dffdc64e6c5e83d0f296b6e95185822daada
 
Red Hat Enterprise Linux Desktop Supplementary (v. 6)

IA-32:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
x86_64:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
Red Hat Enterprise Linux Server Supplementary (v. 6)

IA-32:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
x86_64:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
Red Hat Enterprise Linux Workstation Supplementary (v. 6)

IA-32:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
x86_64:
flash-plugin-11.2.202.643-1.el6_8.i686.rpm
    MD5: 760d513dc2d9b9ce3c7da2bcd96a1ce1SHA-256: 320f0c0cb5d56f130754c036a1f6ab5ce515fbcd789ea1834887c07ef6d4e32e
 
(The unlinked packages above are only available from the Red Hat Network)

1389033 – CVE-2016-7855 flash-plugin: user-after-free issues fixed in APSB16-36

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply