Adobe security bulletin APSB11-28 describes multiple security flaws that can lead to arbitrary code execution when a malicious SWF file is opened in Adobe Flash Player. This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2445). This update resolves a heap corruption vulnerability that could lead to code execution (CVE-2011-2450). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2451). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2452). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2453). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2454). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2455). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2011-2456). This update resolves a stack overflow vulnerability that could lead to code execution (CVE-2011-2457). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2459). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2011-2460). External References: http://www.adobe.com/support/security/bulletins/apsb11-28.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2011:1445 https://rhn.redhat.com/errata/RHSA-2011-1445.html