Mailinglist Archive: opensuse-updates (94 mails)

< Previous Next >
openSUSE-SU-2013:0138-1: moderate: update for acroread
openSUSE Security Update: update for acroread
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:0138-1
Rating: moderate
References: #757393 #768492 #797529
Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

Affected Products:
openSUSE 12.1
______________________________________________________________________________

An update that fixes 27 vulnerabilities is now available.

Description:


- Update to 9.5.3 (bnc#797529) to fix: CVE-2012-1530,
CVE-2013-0601, CVE-2013-0602, CVE-2013-0603,
CVE-2013-0604, CVE-2013-0605, CVE-2013-0606,
CVE-2013-0607, CVE-2013-0608, CVE-2013-0609,
CVE-2013-0610, CVE-2013-0611, CVE-2013-0612,
CVE-2013-0613, CVE-2013-0614, CVE-2013-0615,
CVE-2013-0616, CVE-2013-0617, CVE-2013-0618,
CVE-2013-0619, CVE-2013-0620, CVE-2013-0621,
CVE-2013-0622, CVE-2013-0623, CVE-2013-0624,
CVE-2013-0626, CVE-2013-0627
- move the browser plugin to a subpackage(bnc#768492,
bnc#757393).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.1:

zypper in -t patch openSUSE-2013-38

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.1 (noarch):

acroread-cmaps-9.4.1-3.13.1
acroread-fonts-ja-9.4.1-3.13.1
acroread-fonts-ko-9.4.1-3.13.1
acroread-fonts-zh_CN-9.4.1-3.13.1
acroread-fonts-zh_TW-9.4.1-3.13.1

- openSUSE 12.1 (i586):

acroread-9.5.3-3.13.1
acroread-browser-plugin-9.5.3-3.13.1


References:

http://support.novell.com/security/cve/CVE-2012-1530.html
http://support.novell.com/security/cve/CVE-2013-0601.html
http://support.novell.com/security/cve/CVE-2013-0602.html
http://support.novell.com/security/cve/CVE-2013-0603.html
http://support.novell.com/security/cve/CVE-2013-0604.html
http://support.novell.com/security/cve/CVE-2013-0605.html
http://support.novell.com/security/cve/CVE-2013-0606.html
http://support.novell.com/security/cve/CVE-2013-0607.html
http://support.novell.com/security/cve/CVE-2013-0608.html
http://support.novell.com/security/cve/CVE-2013-0609.html
http://support.novell.com/security/cve/CVE-2013-0610.html
http://support.novell.com/security/cve/CVE-2013-0611.html
http://support.novell.com/security/cve/CVE-2013-0612.html
http://support.novell.com/security/cve/CVE-2013-0613.html
http://support.novell.com/security/cve/CVE-2013-0614.html
http://support.novell.com/security/cve/CVE-2013-0615.html
http://support.novell.com/security/cve/CVE-2013-0616.html
http://support.novell.com/security/cve/CVE-2013-0617.html
http://support.novell.com/security/cve/CVE-2013-0618.html
http://support.novell.com/security/cve/CVE-2013-0619.html
http://support.novell.com/security/cve/CVE-2013-0620.html
http://support.novell.com/security/cve/CVE-2013-0621.html
http://support.novell.com/security/cve/CVE-2013-0622.html
http://support.novell.com/security/cve/CVE-2013-0623.html
http://support.novell.com/security/cve/CVE-2013-0624.html
http://support.novell.com/security/cve/CVE-2013-0626.html
http://support.novell.com/security/cve/CVE-2013-0627.html
https://bugzilla.novell.com/757393
https://bugzilla.novell.com/768492
https://bugzilla.novell.com/797529


< Previous Next >
This Thread
  • No further messages