<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="af82ce465dd28a7a87602e1069a0e963"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="acroread-2508"
    timestamp="1169231083"
    engine="1.0">
  <yum:name>acroread</yum:name>
  <summary lang="en">Security update for acroread</summary>
  <summary lang="de">Security update for acroread</summary>
  <description lang="en">The Adobe Acrobat Reader has been updated to version 7.0.9.

This update also includes following security fixes:

CVE-2006-5857: A memory corruption problem was fixed in
Adobe Acrobat Reader can potentially lead to code
execution.

CVE-2007-0044: Universal Cross Site Request Forgery (CSRF)
problems were fixed in the Acrobat Reader plugin which
could be exploited by remote attackers to conduct CSRF
attacks using any site that is providing PDFs.

CVE-2007-0045: Cross site scripting problems in the Acrobat
Reader plugin were fixed, which could be exploited by
remote attackers to conduct XSS attacks against any site
that is providing PDFs.

CVE-2007-0046: A double free problem in the Acrobat Reader
plugin was fixed which could be used by remote attackers
to potentially execute arbitrary code. Note that all
platforms using Adobe Reader currently have counter
measures against such attack where it will just cause a
controlled abort().

CVE-2007-0047 and CVE-2007-0048 affect only Microsoft
Windows and Internet Explorer.
</description>
  <description lang="de">The Adobe Acrobat Reader has been updated to version 7.0.9.

This update also includes following security fixes:

CVE-2006-5857: A memory corruption problem was fixed in
Adobe Acrobat Reader can potentially lead to code
execution.

CVE-2007-0044: Universal Cross Site Request Forgery (CSRF)
problems were fixed in the Acrobat Reader plugin which
could be exploited by remote attackers to conduct CSRF
attacks using any site that is providing PDFs.

CVE-2007-0045: Cross site scripting problems in the Acrobat
Reader plugin were fixed, which could be exploited by
remote attackers to conduct XSS attacks against any site
that is providing PDFs.

CVE-2007-0046: A double free problem in the Acrobat Reader
plugin was fixed which could be used by remote attackers
to potentially execute arbitrary code. Note that all
platforms using Adobe Reader currently have counter
measures against such attack where it will just cause a
controlled abort().

CVE-2007-0047 and CVE-2007-0048 affect only Microsoft
Windows and Internet Explorer.
</description>
  <yum:version ver="2508" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="acroread" epoch="0" ver="7.0.9" rel="1.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>acroread</name>
      <arch>i586</arch>
      <version epoch="0" ver="7.0.9" rel="1.2"/>
      <checksum type="sha" pkgid="YES">3598beb7e25fbc4a62855be77735cf1dcf912cb0</checksum>
      <time file="1169467570" build="1169231083"/>
      <size package="41699344" installed="115216999" archive="115276680"/>
      <location xml:base="media://#1" href="suse/i586/acroread-7.0.9-1.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="acroread" epoch="0" ver="7.0.9" rel="1.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="acroread"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
