Adobe has released a prenotification of APSB12-08 indicated that it will release updates for Adobe Reader 9.x for Linux. No details have been noted other than that they fix critical vulnerabilities in the software. External References: http://www.adobe.com/support/security/bulletins/apsb12-08.html
Further details from the bulletin, updated today: These updates resolve an integer overflow in the True Type Font (TTF) handling that could lead to code execution (CVE-2012-0774). These updates resolve a memory corruption in the JavaScript handling that could lead to code execution (CVE-2012-0775). These updates resolve a security bypass via the Adobe Reader installer that could lead to code execution (CVE-2012-0776). These updates resolve a memory corruption in the JavaScript API that could lead to code execution (CVE-2012-0777) (Macintosh and Linux only).
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2012:0469 https://rhn.redhat.com/errata/RHSA-2012-0469.html
Adobe has updated APSB12-08 to note that it also addressed the flaws from APSB12-01 (for which there was no Linux release), in particular addressing CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, and CVE-2011-4373. These four CVEs have been addressed in Linux via APSB12-08.