Risks
Advisories
Browse
or
or
SUSE Security Update - Acrobat Reader (SUSE-SU-2013:0047-1)
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0047-1
Rating:             important
References:         #791654 #797529
Cross-References:   CVE-2012-1530 CVE-2013-0601 CVE-2013-0602
                    CVE-2013-0603 CVE-2013-0604 CVE-2013-0605
                    CVE-2013-0606 CVE-2013-0607 CVE-2013-0608
                    CVE-2013-0609 CVE-2013-0610 CVE-2013-0611
                    CVE-2013-0612 CVE-2013-0613 CVE-2013-0614
                    CVE-2013-0615 CVE-2013-0616 CVE-2013-0617
                    CVE-2013-0618 CVE-2013-0619 CVE-2013-0620
                    CVE-2013-0621 CVE-2013-0622 CVE-2013-0623
                    CVE-2013-0624 CVE-2013-0626 CVE-2013-0627

Affected Products:
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that fixes 27 vulnerabilities is now available.
   It includes one version update.

Description:


   Acrobat Reader was updated to 9.5.3 to fix various bugs and
   security  issues.

   More information can be found at
   http://www.adobe.com/support/security/bulletins/apsb13-02.ht
   ml
   <http://www.adobe.com/support/security/bulletins/apsb13-02.h
   tml>

   The resolved security issues are CVE-2012-1530
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
   > ,  CVE-2013-0601
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
   >  , CVE-2013-0602
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
   > ,  CVE-2013-0603
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
   >  , CVE-2013-0604
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
   > ,  CVE-2013-0605
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
   >  , CVE-2013-0606
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
   > ,  CVE-2013-0607
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
   >  , CVE-2013-0608
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
   > ,  CVE-2013-0609
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
   >  , CVE-2013-0610
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
   > ,  CVE-2013-0611
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
   >  , CVE-2013-0612
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
   > ,  CVE-2013-0613
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
   >  , CVE-2013-0614
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
   > ,  CVE-2013-0615
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
   >  , CVE-2013-0616
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
   > ,  CVE-2013-0617
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
   >  , CVE-2013-0618
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
   > ,  CVE-2013-0619
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
   >  , CVE-2013-0620
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
   > ,  CVE-2013-0621
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
   >  , CVE-2013-0622
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
   > ,  CVE-2013-0623
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
   >  , CVE-2013-0624
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
   > ,  CVE-2013-0626
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
   >  and CVE-2013-0627
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
   > .

Indications:

   Everyone should install this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-acroread-7230

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Desktop 11 SP2 (noarch):

      acroread-cmaps-9.4.6-0.4.2.4
      acroread-fonts-ja-9.4.6-0.4.2.4
      acroread-fonts-ko-9.4.6-0.4.2.4
      acroread-fonts-zh_CN-9.4.6-0.4.2.4
      acroread-fonts-zh_TW-9.4.6-0.4.2.4

   - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.3]:

      acroread-9.5.3-0.2.1


References:

   http://support.novell.com/security/cve/CVE-2012-1530.html
   http://support.novell.com/security/cve/CVE-2013-0601.html
   http://support.novell.com/security/cve/CVE-2013-0602.html
   http://support.novell.com/security/cve/CVE-2013-0603.html
   http://support.novell.com/security/cve/CVE-2013-0604.html
   http://support.novell.com/security/cve/CVE-2013-0605.html
   http://support.novell.com/security/cve/CVE-2013-0606.html
   http://support.novell.com/security/cve/CVE-2013-0607.html
   http://support.novell.com/security/cve/CVE-2013-0608.html
   http://support.novell.com/security/cve/CVE-2013-0609.html
   http://support.novell.com/security/cve/CVE-2013-0610.html
   http://support.novell.com/security/cve/CVE-2013-0611.html
   http://support.novell.com/security/cve/CVE-2013-0612.html
   http://support.novell.com/security/cve/CVE-2013-0613.html
   http://support.novell.com/security/cve/CVE-2013-0614.html
   http://support.novell.com/security/cve/CVE-2013-0615.html
   http://support.novell.com/security/cve/CVE-2013-0616.html
   http://support.novell.com/security/cve/CVE-2013-0617.html
   http://support.novell.com/security/cve/CVE-2013-0618.html
   http://support.novell.com/security/cve/CVE-2013-0619.html
   http://support.novell.com/security/cve/CVE-2013-0620.html
   http://support.novell.com/security/cve/CVE-2013-0621.html
   http://support.novell.com/security/cve/CVE-2013-0622.html
   http://support.novell.com/security/cve/CVE-2013-0623.html
   http://support.novell.com/security/cve/CVE-2013-0624.html
   http://support.novell.com/security/cve/CVE-2013-0626.html
   http://support.novell.com/security/cve/CVE-2013-0627.html
   https://bugzilla.novell.com/791654
   https://bugzilla.novell.com/797529
   http://download.novell.com/patch/finder/?keywords=97f58b8e36c19fed220fe34974de6f21




Spotlight

New Zeus variant targets users of 150 banks

Posted on 19 December 2014.  |  A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Dec 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //