Boost your Security
Not everybody is aware of the paper "Application-Specific Attacks: Leveraging the ActionScript Virtual Machine" written by Mark Dowd, in which he describes various techniques that promise to open up a class of exploits and vulnerability research previously thought to be prohibitively difficult. While the Flash vulnerability described in the paper [pdf] has been patched by Adobe, the presentation of a reliable exploit for NULL pointer dereferencing has the researchers who have read the paper fascinated. Thomas Ptacek has an explanation of Dowd's work, and Nathan McFeters at ZDNet is 'stunned by the technical details'. You should at least read the explanation.
What does that mean to the average desktop user?
If Adobe had not fixed the security issue, or if there are others in the flash plugin, your account could be infected by a virus, trojan or anything else while you watch a malicious video on youtube. And you wouldn't even recognize it, because the flash player keeps playing the video. This exploit works on the Windows plugin as well as the Linux version, because inside Adobe uses the same code. So, you say: "infecting a normal user account does not fully compromise my system". But if you are a single user, you most likely call "sudo" or enter your password or root's password in consolehelper to run system-config tools. A virus/trojan can run itself every time you login, by adding itself to .bash_profile or the gnome-session, log/sniff all keystrokes and send them to his master. You would not recognize that in the first place. By recording your passwords, root access can be gained easily. There goes your system. With recent techniques your computer may boot first a trojan, which runs all other operating system then in a "virtual" machine. Boom.
What can you do?
Turn on SELinux. Install nspluginwrapper. Don't install untrusted third party software. Listen to Daniel Walsh and help him. Confine the flash plugin and your user account. Help to improve the SELinux policies.