Risks
Advisories
Browse
or
or
SUSE Security Update - Acrobat Reader (SUSE-SU-2013:0044-1)
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0044-1
Rating:             important
References:         #797529
Cross-References:   CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
                    CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
                    CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
                    CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
                    CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
                    CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
                    CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
                    CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
                    CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

Affected Products:
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 27 vulnerabilities is now available.
   It includes two new package versions.

Description:


   Acrobat Reader was updated to 9.5.3 to fix various bugs and
   security  issues.

   More information can be found at
   http://www.adobe.com/support/security/bulletins/apsb13-02.ht
   ml
   <http://www.adobe.com/support/security/bulletins/apsb13-02.h
   tml>

   The resolved security issues are CVE-2012-1530
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
   > ,  CVE-2013-0601
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
   >  , CVE-2013-0602
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
   > ,  CVE-2013-0603
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
   >  , CVE-2013-0604
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
   > ,  CVE-2013-0605
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
   >  , CVE-2013-0606
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
   > ,  CVE-2013-0607
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
   >  , CVE-2013-0608
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
   > ,  CVE-2013-0609
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
   >  , CVE-2013-0610
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
   > ,  CVE-2013-0611
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
   >  , CVE-2013-0612
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
   > ,  CVE-2013-0613
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
   >  , CVE-2013-0614
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
   > ,  CVE-2013-0615
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
   >  , CVE-2013-0616
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
   > ,  CVE-2013-0617
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
   >  , CVE-2013-0618
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
   > ,  CVE-2013-0619
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
   >  , CVE-2013-0620
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
   > ,  CVE-2013-0621
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
   >  , CVE-2013-0622
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
   > ,  CVE-2013-0623
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
   >  , CVE-2013-0624
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
   > ,  CVE-2013-0626
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
   >  and CVE-2013-0627
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
   > .

Indications:

   Everyone should install this update.


Package List:

   - SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:

      acroread-cmaps-9.4.6-0.6.59
      acroread-fonts-ja-9.4.6-0.6.59
      acroread-fonts-ko-9.4.6-0.6.59
      acroread-fonts-zh_CN-9.4.6-0.6.59
      acroread-fonts-zh_TW-9.4.6-0.6.59

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]:

      acroread-9.5.3-0.6.2


References:

   http://support.novell.com/security/cve/CVE-2012-1530.html
   http://support.novell.com/security/cve/CVE-2013-0601.html
   http://support.novell.com/security/cve/CVE-2013-0602.html
   http://support.novell.com/security/cve/CVE-2013-0603.html
   http://support.novell.com/security/cve/CVE-2013-0604.html
   http://support.novell.com/security/cve/CVE-2013-0605.html
   http://support.novell.com/security/cve/CVE-2013-0606.html
   http://support.novell.com/security/cve/CVE-2013-0607.html
   http://support.novell.com/security/cve/CVE-2013-0608.html
   http://support.novell.com/security/cve/CVE-2013-0609.html
   http://support.novell.com/security/cve/CVE-2013-0610.html
   http://support.novell.com/security/cve/CVE-2013-0611.html
   http://support.novell.com/security/cve/CVE-2013-0612.html
   http://support.novell.com/security/cve/CVE-2013-0613.html
   http://support.novell.com/security/cve/CVE-2013-0614.html
   http://support.novell.com/security/cve/CVE-2013-0615.html
   http://support.novell.com/security/cve/CVE-2013-0616.html
   http://support.novell.com/security/cve/CVE-2013-0617.html
   http://support.novell.com/security/cve/CVE-2013-0618.html
   http://support.novell.com/security/cve/CVE-2013-0619.html
   http://support.novell.com/security/cve/CVE-2013-0620.html
   http://support.novell.com/security/cve/CVE-2013-0621.html
   http://support.novell.com/security/cve/CVE-2013-0622.html
   http://support.novell.com/security/cve/CVE-2013-0623.html
   http://support.novell.com/security/cve/CVE-2013-0624.html
   http://support.novell.com/security/cve/CVE-2013-0626.html
   http://support.novell.com/security/cve/CVE-2013-0627.html
   https://bugzilla.novell.com/797529
   http://download.novell.com/patch/finder/?keywords=439f017a53eac3afd9cf07feecd10c66




Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //