Adobe decided to stop developing Flash Player, however the company will provide updates for it until the end of 2020. The company released security updates for several of its products such as Reader, Acrobat, Digital Editions, Experience Manager and Flash Player. The updates are available on Mac, Linux, Chrome OS and Windows.
The security updates
Adobe fixed two vulnerabilities for Flash Player. The first one is connected to a critical type of confusion vulnerability which could potentially trigger code execution.
The second security update deals with a bypass vulnerability which could disclosure information. The fixers of these two security updates are Björn Ruytenberg (from Trend Micro’s Zero Day Initiative), Mateusz Jurczyk and Natalie Silvanovich.
Other security updates included more than 60 flaws for Adobe Reader and Acrobat used on Mac and Windows PCs. Some of these flaws included critical memory corruption, confusion vulnerabilities and use-after-free. The company advises the general public to update their software.
How to update your software
To follow Adobe’s recommendation of updating your software, it is important to follow certain steps for a proper security update. For example, users can do a manual installation or their product going to Help and click on Check for Updates. In most cases, the product will automatically update when it detects new available updates and a manual intervention is not necessary. But there might be users who have disabled this option and therefore need to do it manually. To install the full Acrobat Reader, users need to go to the Acrobat Reader Download Center.
Goodbye Flash Player
The American computer software company announced that by the end of 2020 Flash Player will receive no more support. This decision has been well received by other big companies such as Apple, Google, Facebook and Microsoft.
Get more stuff like this
in your inbox
Subscribe to our mailing list and get interesting products and updates to your email inbox.
Thank you for subscribing.
Something went wrong.