Adobe security bulletin APSB11-02 describes multiple security flaws that can lead to arbitrary code execution when a malicious flash file is opened by Adobe Flash Player. http://www.adobe.com/support/security/bulletins/apsb11-02.html This update resolves an integer overflow vulnerability that could lead to code execution (CVE-2011-0558). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0559). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0560, CVE-2011-0561). This update resolves multiple memory corruption vulnerabilities that could lead to code execution (CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574). This update resolves a library-loading vulnerability that could lead to code execution (CVE-2011-0575). This update resolves a font-parsing vulnerability that could lead to code execution (CVE-2011-0577). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0578). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0607). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-0608). These flaws were corrected in Adobe Flash Plugin 10.2.152.26.
This issue has been addressed in following products: Extras for Red Hat Enterprise Linux 5 Extras for Red Hat Enterprise Linux 6 Via RHSA-2011:0206 https://rhn.redhat.com/errata/RHSA-2011-0206.html
This issue has been addressed in following products: Extras for RHEL 4 Via RHSA-2011:0259 https://rhn.redhat.com/errata/RHSA-2011-0259.html
This issue has been addressed in following products: Extras for RHEL 4 Via RHSA-2011:0368 https://rhn.redhat.com/errata/RHSA-2011-0368.html