Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2013:0044-1: important: Security update for Acrobat Reader

Recommended Posts

SUSE Security Update: Security update for Acrobat Reader

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2013:0044-1

Rating: important

References: #797529

Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602

CVE-2013-0603 CVE-2013-0604 CVE-2013-0605

CVE-2013-0606 CVE-2013-0607 CVE-2013-0608

CVE-2013-0609 CVE-2013-0610 CVE-2013-0611

CVE-2013-0612 CVE-2013-0613 CVE-2013-0614

CVE-2013-0615 CVE-2013-0616 CVE-2013-0617

CVE-2013-0618 CVE-2013-0619 CVE-2013-0620

CVE-2013-0621 CVE-2013-0622 CVE-2013-0623

CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

 

Affected Products:

SUSE Linux Enterprise Desktop 10 SP4

______________________________________________________________________________

 

An update that fixes 27 vulnerabilities is now available.

It includes two new package versions.

 

Description:

 

 

Acrobat Reader was updated to 9.5.3 to fix various bugs and

security issues.

 

More information can be found at

http://www.adobe.com/support/security/bulletins/apsb13-02.ht

ml

 

 

The resolved security issues are CVE-2012-1530

, CVE-2013-0601

, CVE-2013-0602

, CVE-2013-0603

, CVE-2013-0604

, CVE-2013-0605

, CVE-2013-0606

, CVE-2013-0607

, CVE-2013-0608

, CVE-2013-0609

, CVE-2013-0610

, CVE-2013-0611

, CVE-2013-0612

, CVE-2013-0613

, CVE-2013-0614

, CVE-2013-0615

, CVE-2013-0616

, CVE-2013-0617

, CVE-2013-0618

, CVE-2013-0619

, CVE-2013-0620

, CVE-2013-0621

, CVE-2013-0622

, CVE-2013-0623

, CVE-2013-0624

, CVE-2013-0626

and CVE-2013-0627

.

 

Indications:

 

Everyone should install this update.

 

 

Package List:

 

- SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:

 

acroread-cmaps-9.4.6-0.6.59

acroread-fonts-ja-9.4.6-0.6.59

acroread-fonts-ko-9.4.6-0.6.59

acroread-fonts-zh_CN-9.4.6-0.6.59

acroread-fonts-zh_TW-9.4.6-0.6.59

 

- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]:

 

acroread-9.5.3-0.6.2

 

 

References:

 

http://support.novell.com/security/cve/CVE-2012-1530.html

http://support.novell.com/security/cve/CVE-2013-0601.html

http://support.novell.com/security/cve/CVE-2013-0602.html

http://support.novell.com/security/cve/CVE-2013-0603.html

http://support.novell.com/security/cve/CVE-2013-0604.html

http://support.novell.com/security/cve/CVE-2013-0605.html

http://support.novell.com/security/cve/CVE-2013-0606.html

http://support.novell.com/security/cve/CVE-2013-0607.html

http://support.novell.com/security/cve/CVE-2013-0608.html

http://support.novell.com/security/cve/CVE-2013-0609.html

http://support.novell.com/security/cve/CVE-2013-0610.html

http://support.novell.com/security/cve/CVE-2013-0611.html

http://support.novell.com/security/cve/CVE-2013-0612.html

http://support.novell.com/security/cve/CVE-2013-0613.html

http://support.novell.com/security/cve/CVE-2013-0614.html

http://support.novell.com/security/cve/CVE-2013-0615.html

http://support.novell.com/security/cve/CVE-2013-0616.html

http://support.novell.com/security/cve/CVE-2013-0617.html

http://support.novell.com/security/cve/CVE-2013-0618.html

http://support.novell.com/security/cve/CVE-2013-0619.html

http://support.novell.com/security/cve/CVE-2013-0620.html

http://support.novell.com/security/cve/CVE-2013-0621.html

http://support.novell.com/security/cve/CVE-2013-0622.html

http://support.novell.com/security/cve/CVE-2013-0623.html

http://support.novell.com/security/cve/CVE-2013-0624.html

http://support.novell.com/security/cve/CVE-2013-0626.html

http://support.novell.com/security/cve/CVE-2013-0627.html

https://bugzilla.novell.com/797529

http://download.novell.com/patch/finder/?keywords=439f017a53eac3afd9cf07feecd10c66

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×