From $URL: A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Word (.doc) file delivered as an email attachment, targeting the Windows platform. At this time, Adobe is not aware of any attacks via PDF targeting Adobe Reader and Acrobat. Adobe Reader X Protected Mode mitigations would prevent an exploit of this kind from executing.
Adobe has released 10.2.159.1. http://www.adobe.com/support/security/bulletins/apsb11-07.html
*** Bug 363821 has been marked as a duplicate of this bug. ***
If anyone can do this sooner than I can, please feel free. I suspect just bumping the package version numbers should work. I may not be able to get at this for a couple days.
(In reply to comment #3) > If anyone can do this sooner than I can, please feel free. I suspect just > bumping the package version numbers should work. I may not be able to get at > this for a couple days. I can confirm that renaming the ebuild downloads and installs the correct version, and it works correctly here (hardened amd64). Since this is being exploited in the wild, it would be great if someone can handle this. Thanks!
Well, I got it in the tree sooner than I thought! Though I haven't had a lot of time to test it... www-plugins/adobe-flash-10.2.195.1 (and _p201011173 for the 64bit native) As usual there's no reason to wait that long before requesting it go stable, but please do not stabilize the _p... version.
(In reply to comment #5) > Well, I got it in the tree sooner than I thought! Though I haven't had a lot > of time to test it... > Great, thank you. Arches, please test and mark stable: =www-plugins/adobe-flash-10.2.159.1 Target keywords : "amd64 x86"
x86 stable
works on amd64
amd64 stable
Thanks, folks. Added to existing GLSA request.
CVE-2011-0611 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0611): Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
This issue was resolved and addressed in GLSA 201110-11 at http://security.gentoo.org/glsa/glsa-201110-11.xml by GLSA coordinator Tim Sammut (underling).