SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________
Announcement ID: SUSE-SU-2013:0044-1 Rating: important References: #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available. It includes two new package versions.
Description:
Acrobat Reader was updated to 9.5.3 to fix various bugs and security issues.
More information can be found at http://www.adobe.com/support/security/bulletins/apsb13-02.ht ml <http://www.adobe.com/support/security/bulletins/apsb13-02.h tml>
The resolved security issues are CVE-2012-1530 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530 > , CVE-2013-0601 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601 > , CVE-2013-0602 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602 > , CVE-2013-0603 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603 > , CVE-2013-0604 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604 > , CVE-2013-0605 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605 > , CVE-2013-0606 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606 > , CVE-2013-0607 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607 > , CVE-2013-0608 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608 > , CVE-2013-0609 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609 > , CVE-2013-0610 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610 > , CVE-2013-0611 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611 > , CVE-2013-0612 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612 > , CVE-2013-0613 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613 > , CVE-2013-0614 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614 > , CVE-2013-0615 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615 > , CVE-2013-0616 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616 > , CVE-2013-0617 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617 > , CVE-2013-0618 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618 > , CVE-2013-0619 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619 > , CVE-2013-0620 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620 > , CVE-2013-0621 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621 > , CVE-2013-0622 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622 > , CVE-2013-0623 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623 > , CVE-2013-0624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624 > , CVE-2013-0626 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626 > and CVE-2013-0627 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627 > .
Indications:
Everyone should install this update.
Package List:
- SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.6.59 acroread-fonts-ja-9.4.6-0.6.59 acroread-fonts-ko-9.4.6-0.6.59 acroread-fonts-zh_CN-9.4.6-0.6.59 acroread-fonts-zh_TW-9.4.6-0.6.59
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]:
acroread-9.5.3-0.6.2
References:
http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/797529 ?keywords=439f017a53eac3afd9cf07feecd10c66
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|