SuSE: 2009-035: Acrobat Reader Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: acroread
Announcement ID: SUSE-SA:2009:035
Date: Wed, 01 Jul 2009 17:00:00 +0000
Affected Products: openSUSE 10.3
openSUSE 11.0
openSUSE 11.1
SUSE Linux Enterprise Desktop 10 SP2
SLES 11 DEBUGINFO
SLED 11
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE Default Package: yes
Cross-References: CVE-2009-0198, CVE-2009-0509, CVE-2009-0510
CVE-2009-0511, CVE-2009-0512, CVE-2009-1855
CVE-2009-1856, CVE-2009-1857, CVE-2009-1858
CVE-2009-1859, CVE-2009-1861
Content of This Advisory:
1) Security Vulnerability Resolved:
acroread 8.1.6 security release
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update of the Adobe Acrobat Reader acroread to version 8.1.6
fixes the following vulnerabilities:
- CVE-2009-1855: stack overflow that could lead to code execution
- CVE-2009-1856: integer overflow with potential to lead to arbitrary
code execution
- CVE-2009-1857: memory corruption with potential to lead to arbitrary
code execution
- CVE-2009-1858: memory corruption with potential to lead to arbitrary
code execution
- CVE-2009-1859: memory corruption with potential to lead to arbitrary
code execution
- CVE-2009-0198: memory corruption with potential to lead to arbitrary
code execution
- CVE-2009-0509, CVE-2009-0510 CVE-2009-0511, CVE-2009-0512: heap
overflow that could lead to code execution
- CVE-2009-1861: heap overflow that could lead to code execution
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Restart all running instances of acroread after the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References