Mailinglist Archive: opensuse-security-announce (26 mails)

< Previous Next >
[security-announce] SUSE-SU-2013:0047-1: important: Security update for Acrobat Reader
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:0047-1
Rating: important
References: #791654 #797529
Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

Affected Products:
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

An update that fixes 27 vulnerabilities is now available.
It includes one version update.

Description:


Acrobat Reader was updated to 9.5.3 to fix various bugs and
security issues.

More information can be found at
http://www.adobe.com/support/security/bulletins/apsb13-02.ht
ml
<http://www.adobe.com/support/security/bulletins/apsb13-02.h
tml>

The resolved security issues are CVE-2012-1530
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
> , CVE-2013-0601
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
> , CVE-2013-0602
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
> , CVE-2013-0603
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
> , CVE-2013-0604
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
> , CVE-2013-0605
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
> , CVE-2013-0606
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
> , CVE-2013-0607
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
> , CVE-2013-0608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
> , CVE-2013-0609
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
> , CVE-2013-0610
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
> , CVE-2013-0611
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
> , CVE-2013-0612
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
> , CVE-2013-0613
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
> , CVE-2013-0614
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
> , CVE-2013-0615
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
> , CVE-2013-0616
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
> , CVE-2013-0617
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
> , CVE-2013-0618
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
> , CVE-2013-0619
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
> , CVE-2013-0620
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
> , CVE-2013-0621
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
> , CVE-2013-0622
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
> , CVE-2013-0623
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
> , CVE-2013-0624
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
> , CVE-2013-0626
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
> and CVE-2013-0627
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
> .

Indications:

Everyone should install this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Desktop 11 SP2:

zypper in -t patch sledsp2-acroread-7230

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Desktop 11 SP2 (noarch):

acroread-cmaps-9.4.6-0.4.2.4
acroread-fonts-ja-9.4.6-0.4.2.4
acroread-fonts-ko-9.4.6-0.4.2.4
acroread-fonts-zh_CN-9.4.6-0.4.2.4
acroread-fonts-zh_TW-9.4.6-0.4.2.4

- SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]:

acroread-9.5.3-0.2.1


References:

http://support.novell.com/security/cve/CVE-2012-1530.html
http://support.novell.com/security/cve/CVE-2013-0601.html
http://support.novell.com/security/cve/CVE-2013-0602.html
http://support.novell.com/security/cve/CVE-2013-0603.html
http://support.novell.com/security/cve/CVE-2013-0604.html
http://support.novell.com/security/cve/CVE-2013-0605.html
http://support.novell.com/security/cve/CVE-2013-0606.html
http://support.novell.com/security/cve/CVE-2013-0607.html
http://support.novell.com/security/cve/CVE-2013-0608.html
http://support.novell.com/security/cve/CVE-2013-0609.html
http://support.novell.com/security/cve/CVE-2013-0610.html
http://support.novell.com/security/cve/CVE-2013-0611.html
http://support.novell.com/security/cve/CVE-2013-0612.html
http://support.novell.com/security/cve/CVE-2013-0613.html
http://support.novell.com/security/cve/CVE-2013-0614.html
http://support.novell.com/security/cve/CVE-2013-0615.html
http://support.novell.com/security/cve/CVE-2013-0616.html
http://support.novell.com/security/cve/CVE-2013-0617.html
http://support.novell.com/security/cve/CVE-2013-0618.html
http://support.novell.com/security/cve/CVE-2013-0619.html
http://support.novell.com/security/cve/CVE-2013-0620.html
http://support.novell.com/security/cve/CVE-2013-0621.html
http://support.novell.com/security/cve/CVE-2013-0622.html
http://support.novell.com/security/cve/CVE-2013-0623.html
http://support.novell.com/security/cve/CVE-2013-0624.html
http://support.novell.com/security/cve/CVE-2013-0626.html
http://support.novell.com/security/cve/CVE-2013-0627.html
https://bugzilla.novell.com/791654
https://bugzilla.novell.com/797529

http://download.novell.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974de6f21

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages