Secunia Security Advisory - SUSE has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system.
a184e906c6a15457c2a75dc4315d7f03c3949dec1966854fcc7d30d8bd5428f0
----------------------------------------------------------------------
Secunia CSI
+ Microsoft SCCM
-----------------------
= Extensive Patch Management
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
SUSE update for acroread
SECUNIA ADVISORY ID:
SA39560
VERIFY ADVISORY:
http://secunia.com/advisories/39560/
DESCRIPTION:
SUSE has issued an update for acroread. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct cross-site scripting attacks or compromise a user's system.
For more information:
SA39272
SOLUTION:
Apply updated packages.
x86 Platform:
openSUSE 11.2:
http://download.opensuse.org/update/11.2/rpm/i586/acroread-9.3.2-0.2.1.i586.rpm
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/i586/acroread-9.3.2-0.1.1.i586.rpm
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/i586/acroread-9.3.2-0.1.i586.rpm
Platform Independent:
openSUSE 11.2:
http://download.opensuse.org/update/11.2/rpm/noarch/acroread-cmaps-9.3.2-0.2.1.noarch.rpm
http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-ja-9.3.2-0.2.1.noarch.rpm
http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-ko-9.3.2-0.2.1.noarch.rpm
http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.2.1.noarch.rpm
http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.2.1.noarch.rpm
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/noarch/acroread-cmaps-9.3.2-0.1.1.noarch.rpm
http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-ja-9.3.2-0.1.1.noarch.rpm
http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-ko-9.3.2-0.1.1.noarch.rpm
http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.1.1.noarch.rpm
http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.1.1.noarch.rpm
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/noarch/acroread-cmaps-9.3.2-0.1.noarch.rpm
http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-ja-9.3.2-0.1.noarch.rpm
http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-ko-9.3.2-0.1.noarch.rpm
http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.1.noarch.rpm
http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.1.noarch.rpm
Sources:
openSUSE 11.2:
http://download.opensuse.org/update/11.2/rpm/src/acroread-9.3.2-0.2.1.nosrc.rpm
http://download.opensuse.org/update/11.2/rpm/src/acroread-cmaps-9.3.2-0.2.1.nosrc.rpm
openSUSE 11.1:
http://download.opensuse.org/update/11.1/rpm/src/acroread-9.3.2-0.1.1.nosrc.rpm
http://download.opensuse.org/update/11.1/rpm/src/acroread-cmaps-9.3.2-0.1.1.nosrc.rpm
openSUSE 11.0:
http://download.opensuse.org/update/11.0/rpm/src/acroread-9.3.2-0.1.nosrc.rpm
http://download.opensuse.org/update/11.0/rpm/src/acroread-cmaps-9.3.2-0.1.nosrc.rpm
Our maintenance customers are notified individually. The packages
are
offered for installation from the maintenance web:
SUSE Linux Enterprise Desktop 10 SP3
http://download.novell.com/patch/finder/?keywords=1a12ee072c929ca16f4fccdba35aff6f
http://download.novell.com/patch/finder/?keywords=ea122670adcd95514736ecbc647a5104
SUSE Linux Enterprise Desktop 10 SP2
http://download.novell.com/patch/finder/?keywords=f7e30df74db75d6712bddcafd7e8eea4
SUSE Linux Enterprise Desktop 11
http://download.novell.com/patch/finder/?keywords=0e9154563fae0e1dd880d336e6cf63c0
http://download.novell.com/patch/finder/?keywords=b058bb7270eba0f7d737bff88e2592e4
ORIGINAL ADVISORY:
SUSE-SA:2010:022:
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00004.html
OTHER REFERENCES:
SA39272:
http://secunia.com/advisories/39272/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------