Security update for Acrobat Reader
SUSE Security Update: Security update for Acrobat Reader
Acrobat Reader was updated to 9.5.3 to fix various bugs and
security issues.
More information can be found at
http://www.adobe.com/support/security/bulletins/apsb13-02.ht
ml
tml>
The resolved security issues are CVE-2012-1530
> , CVE-2013-0601
> , CVE-2013-0602
> , CVE-2013-0603
> , CVE-2013-0604
> , CVE-2013-0605
> , CVE-2013-0606
> , CVE-2013-0607
> , CVE-2013-0608
> , CVE-2013-0609
> , CVE-2013-0610
> , CVE-2013-0611
> , CVE-2013-0612
> , CVE-2013-0613
> , CVE-2013-0614
> , CVE-2013-0615
> , CVE-2013-0616
> , CVE-2013-0617
> , CVE-2013-0618
> , CVE-2013-0619
> , CVE-2013-0620
> , CVE-2013-0621
> , CVE-2013-0622
> , CVE-2013-0623
> , CVE-2013-0624
> , CVE-2013-0626
> and CVE-2013-0627
> .
Announcement ID: | SUSE-SU-2013:0047-1 |
Rating: | important |
References: | #791654 #797529 |
Affected Products: |
An update that fixes 27 vulnerabilities is now available. It includes one version update.
Description:
Acrobat Reader was updated to 9.5.3 to fix various bugs and
security issues.
More information can be found at
http://www.adobe.com/support/security/bulletins/apsb13-02.ht
ml
The resolved security issues are CVE-2012-1530
Indications:
Everyone should install this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-acroread-7230
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP2 (noarch):
- acroread-cmaps-9.4.6-0.4.2.4
- acroread-fonts-ja-9.4.6-0.4.2.4
- acroread-fonts-ko-9.4.6-0.4.2.4
- acroread-fonts-zh_CN-9.4.6-0.4.2.4
- acroread-fonts-zh_TW-9.4.6-0.4.2.4
- SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]:
- acroread-9.5.3-0.2.1
References:
- http://support.novell.com/security/cve/CVE-2012-1530.html
- http://support.novell.com/security/cve/CVE-2013-0601.html
- http://support.novell.com/security/cve/CVE-2013-0602.html
- http://support.novell.com/security/cve/CVE-2013-0603.html
- http://support.novell.com/security/cve/CVE-2013-0604.html
- http://support.novell.com/security/cve/CVE-2013-0605.html
- http://support.novell.com/security/cve/CVE-2013-0606.html
- http://support.novell.com/security/cve/CVE-2013-0607.html
- http://support.novell.com/security/cve/CVE-2013-0608.html
- http://support.novell.com/security/cve/CVE-2013-0609.html
- http://support.novell.com/security/cve/CVE-2013-0610.html
- http://support.novell.com/security/cve/CVE-2013-0611.html
- http://support.novell.com/security/cve/CVE-2013-0612.html
- http://support.novell.com/security/cve/CVE-2013-0613.html
- http://support.novell.com/security/cve/CVE-2013-0614.html
- http://support.novell.com/security/cve/CVE-2013-0615.html
- http://support.novell.com/security/cve/CVE-2013-0616.html
- http://support.novell.com/security/cve/CVE-2013-0617.html
- http://support.novell.com/security/cve/CVE-2013-0618.html
- http://support.novell.com/security/cve/CVE-2013-0619.html
- http://support.novell.com/security/cve/CVE-2013-0620.html
- http://support.novell.com/security/cve/CVE-2013-0621.html
- http://support.novell.com/security/cve/CVE-2013-0622.html
- http://support.novell.com/security/cve/CVE-2013-0623.html
- http://support.novell.com/security/cve/CVE-2013-0624.html
- http://support.novell.com/security/cve/CVE-2013-0626.html
- http://support.novell.com/security/cve/CVE-2013-0627.html
- https://bugzilla.novell.com/791654
- https://bugzilla.novell.com/797529
- http://download.suse.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974de6f21