SUSE-SU-2013:0044-1: important: Security update for Acrobat Reader
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Jan 17 15:04:23 MST 2013
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:0044-1
Rating: important
References: #797529
Cross-References: CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
CVE-2013-0624 CVE-2013-0626 CVE-2013-0627
Affected Products:
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available.
It includes two new package versions.
Description:
Acrobat Reader was updated to 9.5.3 to fix various bugs and
security issues.
More information can be found at
http://www.adobe.com/support/security/bulletins/apsb13-02.ht
ml
<http://www.adobe.com/support/security/bulletins/apsb13-02.h
tml>
The resolved security issues are CVE-2012-1530
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
> , CVE-2013-0601
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
> , CVE-2013-0602
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
> , CVE-2013-0603
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
> , CVE-2013-0604
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
> , CVE-2013-0605
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
> , CVE-2013-0606
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
> , CVE-2013-0607
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
> , CVE-2013-0608
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
> , CVE-2013-0609
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
> , CVE-2013-0610
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
> , CVE-2013-0611
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
> , CVE-2013-0612
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
> , CVE-2013-0613
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
> , CVE-2013-0614
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
> , CVE-2013-0615
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
> , CVE-2013-0616
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
> , CVE-2013-0617
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
> , CVE-2013-0618
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
> , CVE-2013-0619
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
> , CVE-2013-0620
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
> , CVE-2013-0621
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
> , CVE-2013-0622
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
> , CVE-2013-0623
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
> , CVE-2013-0624
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
> , CVE-2013-0626
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
> and CVE-2013-0627
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
> .
Indications:
Everyone should install this update.
Package List:
- SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.6.59
acroread-fonts-ja-9.4.6-0.6.59
acroread-fonts-ko-9.4.6-0.6.59
acroread-fonts-zh_CN-9.4.6-0.6.59
acroread-fonts-zh_TW-9.4.6-0.6.59
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]:
acroread-9.5.3-0.6.2
References:
http://support.novell.com/security/cve/CVE-2012-1530.html
http://support.novell.com/security/cve/CVE-2013-0601.html
http://support.novell.com/security/cve/CVE-2013-0602.html
http://support.novell.com/security/cve/CVE-2013-0603.html
http://support.novell.com/security/cve/CVE-2013-0604.html
http://support.novell.com/security/cve/CVE-2013-0605.html
http://support.novell.com/security/cve/CVE-2013-0606.html
http://support.novell.com/security/cve/CVE-2013-0607.html
http://support.novell.com/security/cve/CVE-2013-0608.html
http://support.novell.com/security/cve/CVE-2013-0609.html
http://support.novell.com/security/cve/CVE-2013-0610.html
http://support.novell.com/security/cve/CVE-2013-0611.html
http://support.novell.com/security/cve/CVE-2013-0612.html
http://support.novell.com/security/cve/CVE-2013-0613.html
http://support.novell.com/security/cve/CVE-2013-0614.html
http://support.novell.com/security/cve/CVE-2013-0615.html
http://support.novell.com/security/cve/CVE-2013-0616.html
http://support.novell.com/security/cve/CVE-2013-0617.html
http://support.novell.com/security/cve/CVE-2013-0618.html
http://support.novell.com/security/cve/CVE-2013-0619.html
http://support.novell.com/security/cve/CVE-2013-0620.html
http://support.novell.com/security/cve/CVE-2013-0621.html
http://support.novell.com/security/cve/CVE-2013-0622.html
http://support.novell.com/security/cve/CVE-2013-0623.html
http://support.novell.com/security/cve/CVE-2013-0624.html
http://support.novell.com/security/cve/CVE-2013-0626.html
http://support.novell.com/security/cve/CVE-2013-0627.html
https://bugzilla.novell.com/797529
http://download.novell.com/patch/finder/?keywords=439f017a53eac3afd9cf07feecd10c66
More information about the sle-updates
mailing list