Adobe Patches Flash Player, AIR

Adobe has released new versions of its Flash Player and AIR software for all platforms (Windows, Mac OS X, Linux, Solaris, and Android), to address 13 identified security vulnerabilities.  The affected software versions are:

  • Adobe Flash Player 10.3.181.36 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems
  • Adobe Flash Player 10.3.185.25 and earlier versions for Android
  • Adobe AIR 2.7 and earlier versions for Windows, Macintosh, and Android

The new version of Flash for Windows, Mac, Linux, and Solaris is 10.3.183.5; the new version of Flash for Android is 10.3.186.3.  The new AIR versions are 2.7.1.1961 for Android, and 2.7.1 for all others.  Further details, including information on the vulnerabilities addressed in this update, are in the Adobe Security Bulletin [APSB11-21].

Because of the security content of this release, I recommend that you install it as soon as you conveniently can. Adobe has characterized this as a Critical update.  Users of Windows, Linux, Mac, and  Solaris systems can obtain the new version from Adobe’s download page; Windows or Mac users should also be able to get the new version via the product’s built-in update function.  Users of Android devices will need to get the update from the Android marketplace.

Windows users who use browsers other than Internet Explorer should note that they will probably need to get two new versions: one for Internet Explorer (ActiveX), and one for everything else.

Update Wednesday, 10 August, 10:10 EDT

Adobe has also issued security bulletins and patches for the following products:

  • Shockwave Player
  • RoboHelp
  • Flash Media Server
  • PhotoShop CSS

This summary page has links to the individual bulletins.

One Response to Adobe Patches Flash Player, AIR

  1. […] for all platforms (Linux, Mac OS X, Windows, and Chrome Frame).  This release incorporates the new version of Adobe’s Flash Player.  More details are available in the release announcement on the […]

%d bloggers like this: