RHSA-2013:1402
Vulnerability from csaf_redhat - Published: 2013-10-02 20:52 - Updated: 2025-11-21 17:45Summary
Red Hat Security Advisory: Adobe Reader - notification of end of updates
Notes
Topic
Updated acroread packages that disable the Adobe Reader web browser plug-in
are now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Details
Adobe Reader allows users to view and print documents in Portable Document
Format (PDF). Adobe Reader 9 reached the end of its support cycle on June
26, 2013, and will not receive any more security updates. Future versions
of Adobe Acrobat Reader will not be available with Red Hat Enterprise
Linux.
The Adobe Reader packages in the Red Hat Network (RHN) channels will
continue to be available. Red Hat will continue to provide these packages
only as a courtesy to customers. Red Hat will not provide updates to the
Adobe Reader packages.
This update disables the Adobe Reader web browser plug-in, which is
available via the acroread-plugin package, to prevent the exploitation of
security issues without user interaction when a user visits a malicious web
page.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated acroread packages that disable the Adobe Reader web browser plug-in\nare now available for Red Hat Enterprise Linux 5 and 6 Supplementary.",
"title": "Topic"
},
{
"category": "general",
"text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF). Adobe Reader 9 reached the end of its support cycle on June\n26, 2013, and will not receive any more security updates. Future versions\nof Adobe Acrobat Reader will not be available with Red Hat Enterprise\nLinux.\n\nThe Adobe Reader packages in the Red Hat Network (RHN) channels will\ncontinue to be available. Red Hat will continue to provide these packages\nonly as a courtesy to customers. Red Hat will not provide updates to the\nAdobe Reader packages.\n\nThis update disables the Adobe Reader web browser plug-in, which is\navailable via the acroread-plugin package, to prevent the exploitation of\nsecurity issues without user interaction when a user visits a malicious web\npage.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1402",
"url": "https://access.redhat.com/errata/RHSA-2013:1402"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://www.adobe.com/support/products/enterprise/eol/eol_matrix.html#863",
"url": "http://www.adobe.com/support/products/enterprise/eol/eol_matrix.html#863"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1402.json"
}
],
"title": "Red Hat Security Advisory: Adobe Reader - notification of end of updates",
"tracking": {
"current_release_date": "2025-11-21T17:45:33+00:00",
"generator": {
"date": "2025-11-21T17:45:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:1402",
"initial_release_date": "2013-10-02T20:52:00+00:00",
"revision_history": [
{
"date": "2013-10-02T20:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-11-13T11:11:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:45:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product_id": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread-plugin@9.5.5-1.el6_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "acroread-0:9.5.5-1.el6_4.1.i686",
"product": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686",
"product_id": "acroread-0:9.5.5-1.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread@9.5.5-1.el6_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "acroread-0:9.5.5-2.el5_10.i386",
"product": {
"name": "acroread-0:9.5.5-2.el5_10.i386",
"product_id": "acroread-0:9.5.5-2.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread@9.5.5-2.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product_id": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/acroread-plugin@9.5.5-2.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z:acroread-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Client-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary-5.10.Z:acroread-plugin-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Client-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z:acroread-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Server-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-2.el5_10.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary-5.10.Z:acroread-plugin-0:9.5.5-2.el5_10.i386"
},
"product_reference": "acroread-plugin-0:9.5.5-2.el5_10.i386",
"relates_to_product_reference": "5Server-Supplementary-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Client-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Client-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Server-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Server-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z:acroread-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "acroread-plugin-0:9.5.5-1.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.4.z:acroread-plugin-0:9.5.5-1.el6_4.1.i686"
},
"product_reference": "acroread-plugin-0:9.5.5-1.el6_4.1.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.4.z"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…