openSUSE Security Update: update for acroread ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:0363-1 Rating: moderate References: #757393 #768492 #797529 Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602 CVE-2013-0603 CVE-2013-0604 CVE-2013-0605 CVE-2013-0606 CVE-2013-0607 CVE-2013-0608 CVE-2013-0609 CVE-2013-0610 CVE-2013-0611 CVE-2013-0612 CVE-2013-0613 CVE-2013-0614 CVE-2013-0615 CVE-2013-0616 CVE-2013-0617 CVE-2013-0618 CVE-2013-0619 CVE-2013-0620 CVE-2013-0621 CVE-2013-0622 CVE-2013-0623 CVE-2013-0624 CVE-2013-0626 CVE-2013-0627 Affected Products: openSUSE 12.2:NonFree ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. Description: - Update to 9.5.3 (bnc#797529) to fix: CVE-2012-1530, CVE-2013-0601, CVE-2013-0602, CVE-2013-0603, CVE-2013-0604, CVE-2013-0605, CVE-2013-0606, CVE-2013-0607, CVE-2013-0608, CVE-2013-0609, CVE-2013-0610, CVE-2013-0611, CVE-2013-0612, CVE-2013-0613, CVE-2013-0614, CVE-2013-0615, CVE-2013-0616, CVE-2013-0617, CVE-2013-0618, CVE-2013-0619, CVE-2013-0620, CVE-2013-0621, CVE-2013-0622, CVE-2013-0623, CVE-2013-0624, CVE-2013-0626, CVE-2013-0627 - move the browser plugin to a subpackage(bnc#768492, bnc#757393). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2:NonFree: zypper in -t patch openSUSE-2013-39 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.2:NonFree (noarch): acroread-cmaps-9.4.1-3.4.1 acroread-fonts-ja-9.4.1-3.4.1 acroread-fonts-ko-9.4.1-3.4.1 acroread-fonts-zh_CN-9.4.1-3.4.1 acroread-fonts-zh_TW-9.4.1-3.4.1 - openSUSE 12.2:NonFree (i586): acroread-9.5.3-3.4.1 acroread-browser-plugin-9.5.3-3.4.1 References: http://support.novell.com/security/cve/CVE-2012-1530.html http://support.novell.com/security/cve/CVE-2013-0601.html http://support.novell.com/security/cve/CVE-2013-0602.html http://support.novell.com/security/cve/CVE-2013-0603.html http://support.novell.com/security/cve/CVE-2013-0604.html http://support.novell.com/security/cve/CVE-2013-0605.html http://support.novell.com/security/cve/CVE-2013-0606.html http://support.novell.com/security/cve/CVE-2013-0607.html http://support.novell.com/security/cve/CVE-2013-0608.html http://support.novell.com/security/cve/CVE-2013-0609.html http://support.novell.com/security/cve/CVE-2013-0610.html http://support.novell.com/security/cve/CVE-2013-0611.html http://support.novell.com/security/cve/CVE-2013-0612.html http://support.novell.com/security/cve/CVE-2013-0613.html http://support.novell.com/security/cve/CVE-2013-0614.html http://support.novell.com/security/cve/CVE-2013-0615.html http://support.novell.com/security/cve/CVE-2013-0616.html http://support.novell.com/security/cve/CVE-2013-0617.html http://support.novell.com/security/cve/CVE-2013-0618.html http://support.novell.com/security/cve/CVE-2013-0619.html http://support.novell.com/security/cve/CVE-2013-0620.html http://support.novell.com/security/cve/CVE-2013-0621.html http://support.novell.com/security/cve/CVE-2013-0622.html http://support.novell.com/security/cve/CVE-2013-0623.html http://support.novell.com/security/cve/CVE-2013-0624.html http://support.novell.com/security/cve/CVE-2013-0626.html http://support.novell.com/security/cve/CVE-2013-0627.html https://bugzilla.novell.com/757393 https://bugzilla.novell.com/768492 https://bugzilla.novell.com/797529