Security update for Acrobat Reader

SUSE Security Update: Security update for Acrobat Reader
Announcement ID: SUSE-SU-2013:0047-1
Rating: important
References: #791654 #797529
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that fixes 27 vulnerabilities is now available. It includes one version update.

    Description:


    Acrobat Reader was updated to 9.5.3 to fix various bugs and
    security issues.

    More information can be found at
    http://www.adobe.com/support/security/bulletins/apsb13-02.ht
    ml
    tml>

    The resolved security issues are CVE-2012-1530
    > , CVE-2013-0601
    > , CVE-2013-0602
    > , CVE-2013-0603
    > , CVE-2013-0604
    > , CVE-2013-0605
    > , CVE-2013-0606
    > , CVE-2013-0607
    > , CVE-2013-0608
    > , CVE-2013-0609
    > , CVE-2013-0610
    > , CVE-2013-0611
    > , CVE-2013-0612
    > , CVE-2013-0613
    > , CVE-2013-0614
    > , CVE-2013-0615
    > , CVE-2013-0616
    > , CVE-2013-0617
    > , CVE-2013-0618
    > , CVE-2013-0619
    > , CVE-2013-0620
    > , CVE-2013-0621
    > , CVE-2013-0622
    > , CVE-2013-0623
    > , CVE-2013-0624
    > , CVE-2013-0626
    > and CVE-2013-0627
    > .

    Indications:

    Everyone should install this update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-acroread-7230

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Desktop 11 SP2 (noarch):
    • acroread-cmaps-9.4.6-0.4.2.4
    • acroread-fonts-ja-9.4.6-0.4.2.4
    • acroread-fonts-ko-9.4.6-0.4.2.4
    • acroread-fonts-zh_CN-9.4.6-0.4.2.4
    • acroread-fonts-zh_TW-9.4.6-0.4.2.4
    • SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]:
    • acroread-9.5.3-0.2.1

    References:

    • http://support.novell.com/security/cve/CVE-2012-1530.html
    • http://support.novell.com/security/cve/CVE-2013-0601.html
    • http://support.novell.com/security/cve/CVE-2013-0602.html
    • http://support.novell.com/security/cve/CVE-2013-0603.html
    • http://support.novell.com/security/cve/CVE-2013-0604.html
    • http://support.novell.com/security/cve/CVE-2013-0605.html
    • http://support.novell.com/security/cve/CVE-2013-0606.html
    • http://support.novell.com/security/cve/CVE-2013-0607.html
    • http://support.novell.com/security/cve/CVE-2013-0608.html
    • http://support.novell.com/security/cve/CVE-2013-0609.html
    • http://support.novell.com/security/cve/CVE-2013-0610.html
    • http://support.novell.com/security/cve/CVE-2013-0611.html
    • http://support.novell.com/security/cve/CVE-2013-0612.html
    • http://support.novell.com/security/cve/CVE-2013-0613.html
    • http://support.novell.com/security/cve/CVE-2013-0614.html
    • http://support.novell.com/security/cve/CVE-2013-0615.html
    • http://support.novell.com/security/cve/CVE-2013-0616.html
    • http://support.novell.com/security/cve/CVE-2013-0617.html
    • http://support.novell.com/security/cve/CVE-2013-0618.html
    • http://support.novell.com/security/cve/CVE-2013-0619.html
    • http://support.novell.com/security/cve/CVE-2013-0620.html
    • http://support.novell.com/security/cve/CVE-2013-0621.html
    • http://support.novell.com/security/cve/CVE-2013-0622.html
    • http://support.novell.com/security/cve/CVE-2013-0623.html
    • http://support.novell.com/security/cve/CVE-2013-0624.html
    • http://support.novell.com/security/cve/CVE-2013-0626.html
    • http://support.novell.com/security/cve/CVE-2013-0627.html
    • https://bugzilla.novell.com/791654
    • https://bugzilla.novell.com/797529
    • http://download.suse.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974de6f21