Risks
Advisories
Browse
or
or
SUSE Security Update - Acrobat Reader (SUSE-SU-2013:0044-1)
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0044-1
Rating:             important
References:         #797529
Cross-References:   CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
                    CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
                    CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
                    CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
                    CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
                    CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
                    CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
                    CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
                    CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

Affected Products:
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes 27 vulnerabilities is now available.
   It includes two new package versions.

Description:


   Acrobat Reader was updated to 9.5.3 to fix various bugs and
   security  issues.

   More information can be found at
   http://www.adobe.com/support/security/bulletins/apsb13-02.ht
   ml
   <http://www.adobe.com/support/security/bulletins/apsb13-02.h
   tml>

   The resolved security issues are CVE-2012-1530
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
   > ,  CVE-2013-0601
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
   >  , CVE-2013-0602
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
   > ,  CVE-2013-0603
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
   >  , CVE-2013-0604
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
   > ,  CVE-2013-0605
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
   >  , CVE-2013-0606
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
   > ,  CVE-2013-0607
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
   >  , CVE-2013-0608
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
   > ,  CVE-2013-0609
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
   >  , CVE-2013-0610
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
   > ,  CVE-2013-0611
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
   >  , CVE-2013-0612
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
   > ,  CVE-2013-0613
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
   >  , CVE-2013-0614
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
   > ,  CVE-2013-0615
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
   >  , CVE-2013-0616
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
   > ,  CVE-2013-0617
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
   >  , CVE-2013-0618
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
   > ,  CVE-2013-0619
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
   >  , CVE-2013-0620
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
   > ,  CVE-2013-0621
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
   >  , CVE-2013-0622
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
   > ,  CVE-2013-0623
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
   >  , CVE-2013-0624
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
   > ,  CVE-2013-0626
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
   >  and CVE-2013-0627
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
   > .

Indications:

   Everyone should install this update.


Package List:

   - SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:

      acroread-cmaps-9.4.6-0.6.59
      acroread-fonts-ja-9.4.6-0.6.59
      acroread-fonts-ko-9.4.6-0.6.59
      acroread-fonts-zh_CN-9.4.6-0.6.59
      acroread-fonts-zh_TW-9.4.6-0.6.59

   - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.3]:

      acroread-9.5.3-0.6.2


References:

   http://support.novell.com/security/cve/CVE-2012-1530.html
   http://support.novell.com/security/cve/CVE-2013-0601.html
   http://support.novell.com/security/cve/CVE-2013-0602.html
   http://support.novell.com/security/cve/CVE-2013-0603.html
   http://support.novell.com/security/cve/CVE-2013-0604.html
   http://support.novell.com/security/cve/CVE-2013-0605.html
   http://support.novell.com/security/cve/CVE-2013-0606.html
   http://support.novell.com/security/cve/CVE-2013-0607.html
   http://support.novell.com/security/cve/CVE-2013-0608.html
   http://support.novell.com/security/cve/CVE-2013-0609.html
   http://support.novell.com/security/cve/CVE-2013-0610.html
   http://support.novell.com/security/cve/CVE-2013-0611.html
   http://support.novell.com/security/cve/CVE-2013-0612.html
   http://support.novell.com/security/cve/CVE-2013-0613.html
   http://support.novell.com/security/cve/CVE-2013-0614.html
   http://support.novell.com/security/cve/CVE-2013-0615.html
   http://support.novell.com/security/cve/CVE-2013-0616.html
   http://support.novell.com/security/cve/CVE-2013-0617.html
   http://support.novell.com/security/cve/CVE-2013-0618.html
   http://support.novell.com/security/cve/CVE-2013-0619.html
   http://support.novell.com/security/cve/CVE-2013-0620.html
   http://support.novell.com/security/cve/CVE-2013-0621.html
   http://support.novell.com/security/cve/CVE-2013-0622.html
   http://support.novell.com/security/cve/CVE-2013-0623.html
   http://support.novell.com/security/cve/CVE-2013-0624.html
   http://support.novell.com/security/cve/CVE-2013-0626.html
   http://support.novell.com/security/cve/CVE-2013-0627.html
   https://bugzilla.novell.com/797529
   http://download.novell.com/patch/finder/?keywords=439f017a53eac3afd9cf07feecd10c66




Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. Itís not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //