<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="23decf3a05ed243b6585bc17331cc559"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-acroread_ja-7359"
    timestamp="1298993288"
    engine="1.0">
  <yum:name>sledp3-acroread_ja</yum:name>
  <summary lang="en">Security update for acroread_ja</summary>
  <description lang="en">
Specially crafted PDF documents can crash acroread or lead to execution of 
arbitrary code. Acroread has been updated to version 9.4.2 to address the 
issues (CVE-2010-4091
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091&gt; , 
CVE-2011-0562 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0562&gt; 
, CVE-2011-0563
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0563&gt; , 
CVE-2011-0565 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0565&gt; 
, CVE-2011-0566
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0566&gt; , 
CVE-2011-0567 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0567&gt; 
, CVE-2011-0570
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0570&gt; , 
CVE-2011-0585 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0585&gt; 
, CVE-2011-0586
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0586&gt; , 
CVE-2011-0587 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0587&gt; 
, CVE-2011-0588
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0588&gt; , 
CVE-2011-0589 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0589&gt; 
, CVE-2011-0590
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0590&gt; , 
CVE-2011-0591 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0591&gt; 
, CVE-2011-0592
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0592&gt; , 
CVE-2011-0593 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0593&gt; 
, CVE-2011-0594
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0594&gt; , 
CVE-2011-0595 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0595&gt; 
, CVE-2011-0596
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0596&gt; , 
CVE-2011-0598 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0598&gt; 
, CVE-2011-0599
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0599&gt; , 
CVE-2011-0600 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0600&gt; 
, CVE-2011-0602
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0602&gt; , 
CVE-2011-0603 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0603&gt; 
, CVE-2011-0604
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0604&gt; , 
CVE-2011-0606 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0606&gt; 
, CVE-2011-0558
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0558&gt; , 
CVE-2011-0559 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0559&gt; 
, CVE-2011-0560
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0560&gt; , 
CVE-2011-0561 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0561&gt; 
, CVE-2011-0571
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0571&gt; , 
CVE-2011-0572 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0572&gt; 
, CVE-2011-0573
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0573&gt; , 
CVE-2011-0574 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0574&gt; 
, CVE-2011-0575
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0575&gt; , 
CVE-2011-0577 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0577&gt; 
, CVE-2011-0578
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0578&gt; , 
CVE-2011-0607 &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0607&gt; 
, CVE-2011-0608
&lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0608&gt; .)

</description>
  <yum:version ver="7359" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="acroread_ja" epoch="0" ver="9.4.2" rel="0.5.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>acroread_ja</name>
      <arch>i586</arch>
      <version epoch="0" ver="9.4.2" rel="0.5.1"/>
      <checksum type="sha" pkgid="YES">fb0a25e158c5014a3dbcc1ae022e3c8e016a87ff</checksum>
      <time file="1298993426" build="1298993288"/>
      <size package="67828917" installed="161015015" archive="161094772"/>
      <location xml:base="media://#1" href="suse/i586/acroread_ja-9.4.2-0.5.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="acroread_ja" epoch="0" ver="9.4.2" rel="0.5.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="acroread_ja"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
