It goes without saying that Microsoft isn’t the only company that has such a rollout on a monthly basis. So, in this article, we’re going to talk about Adobe and some of the patches for their products. As we’re pretty sure you know by now, we will also include links to the download source, so you don’t have to scour the internet to find them.

Acrobat and Reader required the most fixing this month

Last month, Adobe only released three patches addressing six CVEs in Adobe Photoshop, Illustrator, and After Effects. Pretty light, considering that these last few months really tested major companies in terms of software malfunctions and hacking. However, April comes with only four updates addressing 70 CVEs in Acrobat and Reader, Photoshop, After Effects, and Adobe Commerce. Adobe Acrobat and Reader updates are by far the largest, with no less than62 CVEs being addressed just for the two. And to answer your next question, yes, the more severe vulnerabilities being fixed are the Critical-Rated Use-After-Free (UAF) and Out-of-Bounds (OOB) Write bugs. Developers pointed out that these vulnerabilities could actually allow an attacker to execute code on a target system if they can convince a user to open a specially crafted PDF document. If Photoshop is your go-to Adobe software, note that there are 13 CVEs fixed in the patch for the photo editing app. After Effects patches for April 2022 address two Critical-rated CVEs that could allow for code execution, with both bugs listed as stack-based buffer overflows. The patch for Adobe Commerce fixes a single, Critical-rated vulnerability, which Adobe rates as a CVSS 9.1, explaining that authentication would be required to exploit this bug. Admin privileges are also required but, still, if you’re using Commerce, test and deploy this patch as soon as you are able. Another important aspect is that none of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Have you encountered any other bugs while using Adobe software? Share your experience with us in the comments section below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ