---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: SUSE update for acroread SECUNIA ADVISORY ID: SA39560 VERIFY ADVISORY: http://secunia.com/advisories/39560/ DESCRIPTION: SUSE has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. For more information: SA39272 SOLUTION: Apply updated packages. x86 Platform: openSUSE 11.2: http://download.opensuse.org/update/11.2/rpm/i586/acroread-9.3.2-0.2.1.i586.rpm openSUSE 11.1: http://download.opensuse.org/update/11.1/rpm/i586/acroread-9.3.2-0.1.1.i586.rpm openSUSE 11.0: http://download.opensuse.org/update/11.0/rpm/i586/acroread-9.3.2-0.1.i586.rpm Platform Independent: openSUSE 11.2: http://download.opensuse.org/update/11.2/rpm/noarch/acroread-cmaps-9.3.2-0.2.1.noarch.rpm http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-ja-9.3.2-0.2.1.noarch.rpm http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-ko-9.3.2-0.2.1.noarch.rpm http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.2.1.noarch.rpm http://download.opensuse.org/update/11.2/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.2.1.noarch.rpm openSUSE 11.1: http://download.opensuse.org/update/11.1/rpm/noarch/acroread-cmaps-9.3.2-0.1.1.noarch.rpm http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-ja-9.3.2-0.1.1.noarch.rpm http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-ko-9.3.2-0.1.1.noarch.rpm http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.1.1.noarch.rpm http://download.opensuse.org/update/11.1/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.1.1.noarch.rpm openSUSE 11.0: http://download.opensuse.org/update/11.0/rpm/noarch/acroread-cmaps-9.3.2-0.1.noarch.rpm http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-ja-9.3.2-0.1.noarch.rpm http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-ko-9.3.2-0.1.noarch.rpm http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-zh_CN-9.3.2-0.1.noarch.rpm http://download.opensuse.org/update/11.0/rpm/noarch/acroread-fonts-zh_TW-9.3.2-0.1.noarch.rpm Sources: openSUSE 11.2: http://download.opensuse.org/update/11.2/rpm/src/acroread-9.3.2-0.2.1.nosrc.rpm http://download.opensuse.org/update/11.2/rpm/src/acroread-cmaps-9.3.2-0.2.1.nosrc.rpm openSUSE 11.1: http://download.opensuse.org/update/11.1/rpm/src/acroread-9.3.2-0.1.1.nosrc.rpm http://download.opensuse.org/update/11.1/rpm/src/acroread-cmaps-9.3.2-0.1.1.nosrc.rpm openSUSE 11.0: http://download.opensuse.org/update/11.0/rpm/src/acroread-9.3.2-0.1.nosrc.rpm http://download.opensuse.org/update/11.0/rpm/src/acroread-cmaps-9.3.2-0.1.nosrc.rpm Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: SUSE Linux Enterprise Desktop 10 SP3 http://download.novell.com/patch/finder/?keywords=1a12ee072c929ca16f4fccdba35aff6f http://download.novell.com/patch/finder/?keywords=ea122670adcd95514736ecbc647a5104 SUSE Linux Enterprise Desktop 10 SP2 http://download.novell.com/patch/finder/?keywords=f7e30df74db75d6712bddcafd7e8eea4 SUSE Linux Enterprise Desktop 11 http://download.novell.com/patch/finder/?keywords=0e9154563fae0e1dd880d336e6cf63c0 http://download.novell.com/patch/finder/?keywords=b058bb7270eba0f7d737bff88e2592e4 ORIGINAL ADVISORY: SUSE-SA:2010:022: http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00004.html OTHER REFERENCES: SA39272: http://secunia.com/advisories/39272/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------