<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7b18b26afd6af7dd6b34ab13bf0b5464"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="acroread_ja-2545"
    timestamp="1170635663"
    engine="1.0">
  <yum:name>acroread_ja</yum:name>
  <summary lang="en">Security update for acroread_ja</summary>
  <summary lang="de">Security update for acroread_ja</summary>
  <description lang="en">The Adobe Acrobat Reader (Japanese version) has been
updated to version 7.0.9.

This update also includes following security fixes:

CVE-2006-5857: A memory corruption problem was fixed in
Adobe Acrobat Reader can potentially lead to code execution.

CVE-2007-0044: Universal Cross Site Request Forgery (CSRF)
problems were fixed in the Acrobat Reader plugin which
could be exploited by remote attackers to conduct CSRF
attacks using any site that is providing PDFs.

CVE-2007-0045: Cross site scripting problems in the Acrobat
Reader plugin were fixed, which could be exploited by
remote attackers to conduct XSS attacks against any site
that is providing PDFs.

CVE-2007-0046: A double free problem in the Acrobat Reader
plugin was fixed which could be used by remote attackers to
potentially execute arbitrary code. Note that all platforms
using Adobe Reader currently have counter measures against
such attack where it will just cause a controlled abort().

CVE-2007-0047 and CVE-2007-0048 affect only Microsoft
Windows and Internet Explorer.
</description>
  <description lang="de">The Adobe Acrobat Reader (Japanese version) has been
updated to version 7.0.9.

This update also includes following security fixes:

CVE-2006-5857: A memory corruption problem was fixed in
Adobe Acrobat Reader can potentially lead to code execution.

CVE-2007-0044: Universal Cross Site Request Forgery (CSRF)
problems were fixed in the Acrobat Reader plugin which
could be exploited by remote attackers to conduct CSRF
attacks using any site that is providing PDFs.

CVE-2007-0045: Cross site scripting problems in the Acrobat
Reader plugin were fixed, which could be exploited by
remote attackers to conduct XSS attacks against any site
that is providing PDFs.

CVE-2007-0046: A double free problem in the Acrobat Reader
plugin was fixed which could be used by remote attackers to
potentially execute arbitrary code. Note that all platforms
using Adobe Reader currently have counter measures against
such attack where it will just cause a controlled abort().

CVE-2007-0047 and CVE-2007-0048 affect only Microsoft
Windows and Internet Explorer.
</description>
  <yum:version ver="2545" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="acroread_ja" epoch="0" ver="7.0.9" rel="2.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>acroread_ja</name>
      <arch>i586</arch>
      <version epoch="0" ver="7.0.9" rel="2.2"/>
      <checksum type="sha" pkgid="YES">29978b509978585a8479e3a78f95f20a14463071</checksum>
      <time file="1170696998" build="1170635663"/>
      <size package="54795219" installed="136541085" archive="136631108"/>
      <location xml:base="media://#1" href="suse/i586/acroread_ja-7.0.9-2.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="acroread_ja" epoch="0" ver="7.0.9" rel="2.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="acroread_ja"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
