RedHat: RHSA-2009-1499:01 Critical: acroread security update
Summary
Adobe Reader allows users to view and print documents in Portable Document
Format (PDF).
Multiple flaws were discovered in Adobe Reader. A specially-crafted PDF
file could cause Adobe Reader to crash or, potentially, execute arbitrary
code as the user running Adobe Reader when opened. (CVE-2009-2980,
CVE-2009-2983, CVE-2009-2985, CVE-2009-2986, CVE-2009-2990, CVE-2009-2991,
CVE-2009-2993, CVE-2009-2994, CVE-2009-2996, CVE-2009-2997, CVE-2009-2998,
CVE-2009-3458, CVE-2009-3459, CVE-2009-3462)
Multiple flaws were discovered in Adobe Reader. A specially-crafted PDF
file could cause Adobe Reader to crash when opened. (CVE-2009-2979,
CVE-2009-2988, CVE-2009-3431)
An input validation flaw was found in Adobe Reader. Opening a
specially-crafted PDF file could lead to a Trust Manager restrictions
bypass. (CVE-2009-2981)
All Adobe Reader users should install these updated packages. They contain
Adobe Reader version 8.1.7, which is not vulnerable to these issues. All
running instances of Adobe Reader must be restarted for the update to take
effect.
Summary
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462 http://www.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb09-15.html
Package List
Red Hat Enterprise Linux AS version 3 Extras:
i386:
acroread-8.1.7-1.i386.rpm
acroread-plugin-8.1.7-1.i386.rpm
x86_64:
acroread-8.1.7-1.i386.rpm
Red Hat Desktop version 3 Extras:
i386:
acroread-8.1.7-1.i386.rpm
acroread-plugin-8.1.7-1.i386.rpm
x86_64:
acroread-8.1.7-1.i386.rpm
Red Hat Enterprise Linux ES version 3 Extras:
i386:
acroread-8.1.7-1.i386.rpm
acroread-plugin-8.1.7-1.i386.rpm
x86_64:
acroread-8.1.7-1.i386.rpm
Red Hat Enterprise Linux WS version 3 Extras:
i386:
acroread-8.1.7-1.i386.rpm
acroread-plugin-8.1.7-1.i386.rpm
x86_64:
acroread-8.1.7-1.i386.rpm
Red Hat Enterprise Linux AS version 4 Extras:
i386:
acroread-8.1.7-1.el4.i386.rpm
acroread-plugin-8.1.7-1.el4.i386.rpm
x86_64:
acroread-8.1.7-1.el4.i386.rpm
Red Hat Desktop version 4 Extras:
i386:
acroread-8.1.7-1.el4.i386.rpm
acroread-plugin-8.1.7-1.el4.i386.rpm
x86_64:
acroread-8.1.7-1.el4.i386.rpm
Red Hat Enterprise Linux ES version 4 Extras:
i386:
acroread-8.1.7-1.el4.i386.rpm
acroread-plugin-8.1.7-1.el4.i386.rpm
x86_64:
acroread-8.1.7-1.el4.i386.rpm
Red Hat Enterprise Linux WS version 4 Extras:
i386:
acroread-8.1.7-1.el4.i386.rpm
acroread-plugin-8.1.7-1.el4.i386.rpm
x86_64:
acroread-8.1.7-1.el4.i386.rpm
RHEL Desktop Supplementary (v. 5 client):
i386:
acroread-8.1.7-1.el5.i386.rpm
acroread-plugin-8.1.7-1.el5.i386.rpm
x86_64:
acroread-8.1.7-1.el5.i386.rpm
acroread-plugin-8.1.7-1.el5.i386.rpm
RHEL Supplementary (v. 5 server):
i386:
acroread-8.1.7-1.el5.i386.rpm
acroread-plugin-8.1.7-1.el5.i386.rpm
x86_64:
acroread-8.1.7-1.el5.i386.rpm
acroread-plugin-8.1.7-1.el5.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
![Dist Redhat](/images/distros/dist-redhat.png)
Topic
Updated acroread packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4Extras, and Red Hat Enterprise Linux 5 Supplementary.This update has been rated as having critical security impact by the RedHat Security Response Team.
Topic
Relevant Releases Architectures
RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64
Red Hat Desktop version 3 Extras - i386, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux AS version 3 Extras - i386, x86_64
Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 3 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 3 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64
Bugs Fixed
528071 - CVE-2009-3459 acroread: heap overflow fix in version 8.1.7 (APSB09-15)
528659 - acroread: Multiple arbitrary code execution fixes in 8.1.7 (APSB09-15)
528665 - CVE-2009-2979 CVE-2009-2988 CVE-2009-3431 acroread: Multiple DoS fixes in 8.1.7 (APSB09-15)
528666 - CVE-2009-2981 acroread: Trust Manager restrictions bypass fixed in 8.1.7 (APSB09-15)