APSB09-07 update to Adobe Reader 9.1.2

Bug #385414 reported by Fumihito YOSHIDA
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Ubuntu Japanese Kaizen Project
Fix Released
High
Unassigned

Bug Description

Notes: update for Linux will release in 16 Jun.

http://www.adobe.com/support/security/bulletins/apsb09-07.html

|---------------------------
| Severity rating
|---------------------------
|
| Adobe categorizes this as a critical update and recommends that users apply the
| update for their product installations.
|
|---------------------------
| Details
|---------------------------
|
| Critical vulnerabilities have been identified in Adobe Reader 9.1.1 and Acrobat 9.1.1
| and earlier versions. These vulnerabilities would cause the application to crash and
| could potentially allow an attacker to take control of the affected system.
|
|
| This update resolves a stack overflow vulnerability that could potentially lead to code
| execution (CVE-2009-1855).
|
| This update resolves an integer overflow that leads to a Denial of Service (DoS); arbitrary
| code execution has not been demonstrated, but may be possible (CVE-2009-1856).
|
| This update resolves a memory corruption vulnerability that leads to a Denial of Service (DoS);
| arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-1857).
|
| This update resolves a memory corruption vulnerability in the JBIG2 filter that could potentially
| lead to code execution (CVE-2009-1858).
|
| This update resolves a memory corruption vulnerability that could potentially lead to code
| execution (CVE-2009-1859).
|
| This update resolves a memory corruption vulnerability in the JBIG2 filter that leads to a
| Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be
| possible (CVE-2009-0198).
|
| This update resolves multiple heap overflow vulnerabilities in the JBIG2 filter that could
| potentially lead to code execution (CVE-2009-0509, CVE-2009-0510, CVE-2009-0511,
| CVE-2009-0512, CVE-2009-0888, CVE-2009-0889).
|
| This update resolves multiple heap overflow vulnerabilities that could potentially lead to code
| execution(CVE-2009-1861).

Fumihito YOSHIDA (hito)
visibility: private → public
description: updated
Revision history for this message
Fumihito YOSHIDA (hito) wrote :
Revision history for this message
Fumihito YOSHIDA (hito) wrote :

fixed by
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.0
Source: adobereader-jpn
Binary: adobereader-jpn
Architecture: i386
Version: 9.1.2~ja1
Maintainer: Jun Kobayashi <email address hidden>
Standards-Version: 3.6.1
Checksums-Sha1:
 955f42bb696d0dd62293daa8162006ec42b3f4bf 3825 adobereader-jpn_9.1.2~ja1.tar.gz
Checksums-Sha256:
 32a54e22b7680dce49388a52f3729e092bc7de5b5657e51e475542afcd5f8c30 3825 adobereader-jpn_9.1.2~ja1.tar.gz
Files:
 12f8bba81c0cf2c851bba7974c8b5078 3825 adobereader-jpn_9.1.2~ja1.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkpKRtcACgkQHUxMTNFry5Hw+wCgkTfDU0guhaWSnBMloVSmR8kU
RXYAn2kaYEh3A1MUd9UYnbwLCMIBylA3
=/ZcI
-----END PGP SIGNATURE-----

Changed in ubuntu-jp-improvement:
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.