From the upstream advisory at $URL: Summary Critical vulnerabilities have been identified in Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that one of these vulnerabilities (CVE-2011-2444) is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. This universal cross-site scripting issue could be used to take actions on a user's behalf on any website or webmail provider if the user visits a malicious website. Adobe recommends users of Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 10.3.183.10. Users of Adobe Flash Player for Android 10.3.186.6 and earlier versions should update to Adobe Flash Player for Android 10.3.186.7.
Ebuild complete, committed www-plugins/adobe-flash-10.3.183.10 As usual, no need to wait for stabilization, but please do not stabilize adobe-flash-11.*
(In reply to comment #1) > Ebuild complete, committed www-plugins/adobe-flash-10.3.183.10 > > As usual, no need to wait for stabilization, but please do not stabilize > adobe-flash-11.* Thanks, Jim. Arches, please test and mark stable: =www-plugins/adobe-flash-10.3.183.10 Target keywords : "amd64 x86"
amd64: pass
Archtested on x86: Everything fine
amd64 ok
x86 stable, thanks JD
+ 25 Sep 2011; Tony Vroon <chainsaw@gentoo.org> adobe-flash-10.3.183.10.ebuild: + Marked stable on AMD64 based on arch testing by Elijah "Armageddon" El + Lazkani & Agostino "Ago" Sarubbo in bug #384017. Security, please proceed with GLSA voting.
(In reply to comment #7) > Security, please proceed with GLSA voting. B2 provides directly to glsa without vote. @Alex / Tim: Please add the request as usual =)
Thanks, everyone. Added to existing GLSA request.
*** Bug 386209 has been marked as a duplicate of this bug. ***
This issue was resolved and addressed in GLSA 201110-11 at http://security.gentoo.org/glsa/glsa-201110-11.xml by GLSA coordinator Tim Sammut (underling).