Hi, Version 32.0.0.330 fixes CVE-2020-3757. References: https://helpx.adobe.com/security/products/flash-player/apsb20-06.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3757 Best regards, Nico.
Whiteboard: (none) => MGA7TOOSource RPM: (none) => flash-player-pluginCVE: (none) => CVE-2020-3757
Suggested advisory: ======================== Updated flash-player-plugin package fixes a security vulnerability: Type confusion that leads to arbitrary code execution in the context of the current user. (CVE-2020-3757) References: https://helpx.adobe.com/security/products/flash-player/apsb20-06.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3757 ======================== Updated packages in nonfree/updates_testing: ======================== flash-player-plugin-32.0.0.330-1.mga7.nonfree from SRPMS: flash-player-plugin-32.0.0.330-1.mga7.nonfree.src.rpm
Whiteboard: MGA7TOO => (none)Status: NEW => ASSIGNEDAssignee: bugsquad => qa-bugsVersion: Cauldron => 7
64-bit Plasma system. No installation issues. Went to a US radar site known to use flash for some of its loops. Turned off flash, tried a loop, didn't work. Turned it back on, and it worked. OK for 64-bit.
CC: (none) => andrewsfarmWhiteboard: (none) => MGA7-64-OK
Real 32-bit hardware, Xfce system. Again, no installation issues. Performed the same test as in Comment 2, with the same result. OK for 32-bit. Validating. Advisory in Comment 1.
CC: (none) => sysadmin-bugsWhiteboard: MGA7-64-OK => MGA7-64-OK MGA7-32-OKKeywords: (none) => validated_update
Keywords: (none) => advisoryCC: (none) => tmb
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2020-0085.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED