SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________
Announcement ID: SUSE-SU-2013:0047-1 Rating: important References: #791654 #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available. It includes one version update.
Description:
Acrobat Reader was updated to 9.5.3 to fix various bugs and security issues.
More information can be found at http://www.adobe.com/support/security/bulletins/apsb13-02.ht ml <http://www.adobe.com/support/security/bulletins/apsb13-02.h tml>
The resolved security issues are CVE-2012-1530 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530 > , CVE-2013-0601 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601 > , CVE-2013-0602 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602 > , CVE-2013-0603 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603 > , CVE-2013-0604 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604 > , CVE-2013-0605 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605 > , CVE-2013-0606 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606 > , CVE-2013-0607 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607 > , CVE-2013-0608 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608 > , CVE-2013-0609 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609 > , CVE-2013-0610 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610 > , CVE-2013-0611 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611 > , CVE-2013-0612 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612 > , CVE-2013-0613 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613 > , CVE-2013-0614 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614 > , CVE-2013-0615 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615 > , CVE-2013-0616 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616 > , CVE-2013-0617 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617 > , CVE-2013-0618 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618 > , CVE-2013-0619 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619 > , CVE-2013-0620 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620 > , CVE-2013-0621 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621 > , CVE-2013-0622 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622 > , CVE-2013-0623 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623 > , CVE-2013-0624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624 > , CVE-2013-0626 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626 > and CVE-2013-0627 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627 > .
Indications:
Everyone should install this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-acroread-7230
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (noarch):
acroread-cmaps-9.4.6-0.4.2.4 acroread-fonts-ja-9.4.6-0.4.2.4 acroread-fonts-ko-9.4.6-0.4.2.4 acroread-fonts-zh_CN-9.4.6-0.4.2.4 acroread-fonts-zh_TW-9.4.6-0.4.2.4
- SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]:
acroread-9.5.3-0.2.1
References:
http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/791654 https://bugzilla.novell.com/797529 ?keywords=97f58b8e36c19fed220fe34974de6f21
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|