RHSA-2013:1402
Vulnerability from csaf_redhat
Published
2013-10-02 20:52
Modified
2025-09-25 11:48
Summary
Red Hat Security Advisory: Adobe Reader - notification of end of updates
Notes
Topic
Updated acroread packages that disable the Adobe Reader web browser plug-in
are now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Details
Adobe Reader allows users to view and print documents in Portable Document
Format (PDF). Adobe Reader 9 reached the end of its support cycle on June
26, 2013, and will not receive any more security updates. Future versions
of Adobe Acrobat Reader will not be available with Red Hat Enterprise
Linux.
The Adobe Reader packages in the Red Hat Network (RHN) channels will
continue to be available. Red Hat will continue to provide these packages
only as a courtesy to customers. Red Hat will not provide updates to the
Adobe Reader packages.
This update disables the Adobe Reader web browser plug-in, which is
available via the acroread-plugin package, to prevent the exploitation of
security issues without user interaction when a user visits a malicious web
page.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated acroread packages that disable the Adobe Reader web browser plug-in\nare now available for Red Hat Enterprise Linux 5 and 6 Supplementary.",
"title": "Topic"
},
{
"category": "general",
"text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF). Adobe Reader 9 reached the end of its support cycle on June\n26, 2013, and will not receive any more security updates. Future versions\nof Adobe Acrobat Reader will not be available with Red Hat Enterprise\nLinux.\n\nThe Adobe Reader packages in the Red Hat Network (RHN) channels will\ncontinue to be available. Red Hat will continue to provide these packages\nonly as a courtesy to customers. Red Hat will not provide updates to the\nAdobe Reader packages.\n\nThis update disables the Adobe Reader web browser plug-in, which is\navailable via the acroread-plugin package, to prevent the exploitation of\nsecurity issues without user interaction when a user visits a malicious web\npage.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1402",
"url": "https://access.redhat.com/errata/RHSA-2013:1402"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.adobe.com/support/products/enterprise/eol/eol_matrix.html#863",
"url": "http://www.adobe.com/support/products/enterprise/eol/eol_matrix.html#863"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1402.json"
}
],
"title": "Red Hat Security Advisory: Adobe Reader - notification of end of updates",
"tracking": {
"current_release_date": "2025-09-25T11:48:43+00:00",
"generator": {
"date": "2025-09-25T11:48:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2013:1402",
"initial_release_date": "2013-10-02T20:52:00+00:00",
"revision_history": [
{
"date": "2013-10-02T20:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-11-13T11:11:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-25T11:48:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product_id": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread-plugin@9.5.5-1.el6_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "acroread-0:9.5.5-1.el6_4.1.i686",
"product": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686",
"product_id": "acroread-0:9.5.5-1.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread@9.5.5-1.el6_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "acroread-0:9.5.5-2.el5_10.i386",
"product": {
"name": "acroread-0:9.5.5-2.el5_10.i386",
"product_id": "acroread-0:9.5.5-2.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread@9.5.5-2.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product_id": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread-plugin@9.5.5-2.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z:acroread-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Client-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z:acroread-plugin-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Client-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z:acroread-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Server-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z:acroread-plugin-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Server-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Client-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Client-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Server-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Server-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.4.z"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…