[security-announce] SUSE-SU-2013:0047-1: important: Security update for Acrobat Reader
SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0047-1 Rating: important References: #791654 #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. It includes one version update. Description: Acrobat Reader was updated to 9.5.3 to fix various bugs and security issues. More information can be found at http://www.adobe.com/support/security/bulletins/apsb13-02.ht ml <http://www.adobe.com/support/security/bulletins/apsb13-02.h tml> The resolved security issues are CVE-2012-1530 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
, CVE-2013-0601 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601 , CVE-2013-0602 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602 , CVE-2013-0603 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603 , CVE-2013-0604 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604 , CVE-2013-0605 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605 , CVE-2013-0606 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606 , CVE-2013-0607 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607 , CVE-2013-0608 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608 , CVE-2013-0609 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609 , CVE-2013-0610 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610 , CVE-2013-0611 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611 , CVE-2013-0612 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612 , CVE-2013-0613 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613 , CVE-2013-0614 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614 , CVE-2013-0615 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615 , CVE-2013-0616 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616 , CVE-2013-0617 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617 , CVE-2013-0618 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618 , CVE-2013-0619 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619 , CVE-2013-0620 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620 , CVE-2013-0621 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621 , CVE-2013-0622 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622 , CVE-2013-0623 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623 , CVE-2013-0624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624 , CVE-2013-0626 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626 and CVE-2013-0627 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627 .
Indications: Everyone should install this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-acroread-7230 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (noarch): acroread-cmaps-9.4.6-0.4.2.4 acroread-fonts-ja-9.4.6-0.4.2.4 acroread-fonts-ko-9.4.6-0.4.2.4 acroread-fonts-zh_CN-9.4.6-0.4.2.4 acroread-fonts-zh_TW-9.4.6-0.4.2.4 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]: acroread-9.5.3-0.2.1 References: http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/791654 https://bugzilla.novell.com/797529 http://download.novell.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org