Security Updates for Adobe Flash Player
Date: 08 December 2015
The purpose of this advisory is to bring attention to recently released security updates for Adobe Flash Player.
Adobe has released Security Bulletin APSB15-32 to address critical vulnerabilities that could allow an attacker to take control of the affected system.
Affected software versions:
- Adobe Flash Player Desktop Runtime 18.104.22.168 and earlier versions for Windows and Macintosh
- Adobe Flash Player Extended Support Release 22.214.171.1241 and earlier for Windows and Macintosh
- Adobe Flash Player for Google Chrome 126.96.36.199 and earlier versions for Windows, Macintosh, Linux and ChromeOS
- Adobe Flash Player for Microsoft Edge and Internet Explorer 188.8.131.52 and earlier versions for Windows 10
- Adobe Flash Player for Internet Explorer 10 and 184.108.40.206 and earlier versions for Windows 8.0 and 8.1
- Adobe Flash Player for Linux 220.127.116.118 and earlier versions for Linux
- AIR Desktop Runtime 18.104.22.168 and earlier versions for Windows and Macintosh
- AIR SDK 22.214.171.124 and earlier versions for Windows, Macintosh, Android and iOS
- AIR SDK & Compiler 126.96.36.199 and earlier versions for Windows, Macintosh, Android and iOS
- AIR for Android 188.8.131.52 and earlier versions for Android
CVE References: CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8051, CVE-2015-8052, CVE-2015-8053, CVE-2015-8054, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453.
CCIRC recommends that system administrators test and deploy the vendor-released updates to affected applications accordingly.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: