Adobe has released APSB11-12 [1] along with Flash Player 10.3.181.14 to correct a number of critical flaws. The flaws are described as: Critical vulnerabilities have been identified in Adobe Flash Player 10.2.159.1 and earlier versions (Adobe Flash Player 10.2.154.28 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.2.157.51 and earlier versions for Android. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. There are reports of malware attempting to exploit one of the vulnerabilities, CVE-2011-0627, in the wild via a Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file delivered as an email attachment targeting the Windows platform. However, to date, Adobe has not obtained a sample that successfully completes an attack. This update resolves a design flaw that could lead to information disclosure (CVE-2011-0579). This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2011-0618). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0619). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0620). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0621). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0622). This update resolves a bounds checking vulnerability that could lead to code execution (CVE-2011-0623). This update resolves a bounds checking vulnerability that could lead to code execution (CVE-2011-0624). This update resolves a bounds checking vulnerability that could lead to code execution (CVE-2011-0625). This update resolves a bounds checking vulnerability that could lead to code execution (CVE-2011-0626). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0627).
[1] http://www.adobe.com/support/security/bulletins/apsb11-12.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2011:0511 https://rhn.redhat.com/errata/RHSA-2011-0511.html
The upstream advisory added an additional CVE: This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2011-0628).