Activity log for bug #385414

Date Who What changed Old value New value Message
2009-06-10 01:00:21 Fumihito YOSHIDA bug added bug
2009-06-10 01:00:36 Fumihito YOSHIDA visibility private public
2009-06-10 01:02:27 Fumihito YOSHIDA description Notes: update for Linux will release in 16 Jun. http://www.adobe.com/support/security/bulletins/apsb09-07.html |--------------------------- | Severity rating |--------------------------- | | Adobe categorizes this as a critical update and recommends that users apply the update for their product | installations. | |--------------------------- | Details |--------------------------- | | Critical vulnerabilities have been identified in Adobe Reader 9.1.1 and Acrobat 9.1.1 and earlier versions. | These vulnerabilities would cause the application to crash and could potentially allow an attacker to take | control of the affected system. | | | This update resolves a stack overflow vulnerability that could potentially lead to code execution (CVE-2009-1855). | | This update resolves an integer overflow that leads to a Denial of Service (DoS); arbitrary code execution has | not been demonstrated, but may be possible (CVE-2009-1856). | | This update resolves a memory corruption vulnerability that leads to a Denial of Service (DoS); arbitrary code | execution has not been demonstrated, but may be possible (CVE-2009-1857). | | This update resolves a memory corruption vulnerability in the JBIG2 filter that could potentially lead to code | execution (CVE-2009-1858). | | This update resolves a memory corruption vulnerability that could potentially lead to code execution | (CVE-2009-1859). | | This update resolves a memory corruption vulnerability in the JBIG2 filter that leads to a Denial of Service | (DoS); arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-0198). | | This update resolves multiple heap overflow vulnerabilities in the JBIG2 filter that could potentially lead to | code execution (CVE-2009-0509, CVE-2009-0510, CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, | CVE-2009-0889). | | This update resolves multiple heap overflow vulnerabilities that could potentially lead to code execution | (CVE-2009-1861). Notes: update for Linux will release in 16 Jun. http://www.adobe.com/support/security/bulletins/apsb09-07.html |--------------------------- | Severity rating |--------------------------- | | Adobe categorizes this as a critical update and recommends that users apply the | update for their product installations. | |--------------------------- | Details |--------------------------- | | Critical vulnerabilities have been identified in Adobe Reader 9.1.1 and Acrobat 9.1.1 | and earlier versions. These vulnerabilities would cause the application to crash and | could potentially allow an attacker to take control of the affected system. | | | This update resolves a stack overflow vulnerability that could potentially lead to code | execution (CVE-2009-1855). | | This update resolves an integer overflow that leads to a Denial of Service (DoS); arbitrary | code execution has not been demonstrated, but may be possible (CVE-2009-1856). | | This update resolves a memory corruption vulnerability that leads to a Denial of Service (DoS); | arbitrary code execution has not been demonstrated, but may be possible (CVE-2009-1857). | | This update resolves a memory corruption vulnerability in the JBIG2 filter that could potentially | lead to code execution (CVE-2009-1858). | | This update resolves a memory corruption vulnerability that could potentially lead to code | execution (CVE-2009-1859). | | This update resolves a memory corruption vulnerability in the JBIG2 filter that leads to a | Denial of Service (DoS); arbitrary code execution has not been demonstrated, but may be | possible (CVE-2009-0198). | | This update resolves multiple heap overflow vulnerabilities in the JBIG2 filter that could | potentially lead to code execution (CVE-2009-0509, CVE-2009-0510, CVE-2009-0511, | CVE-2009-0512, CVE-2009-0888, CVE-2009-0889). | | This update resolves multiple heap overflow vulnerabilities that could potentially lead to code | execution(CVE-2009-1861).
2009-06-10 01:08:00 Fumihito YOSHIDA cve linked 2009-1855
2009-06-10 01:08:14 Fumihito YOSHIDA cve linked 2009-1856
2009-06-10 01:08:23 Fumihito YOSHIDA cve linked 2009-1857
2009-06-10 01:08:31 Fumihito YOSHIDA cve linked 2009-1858
2009-06-10 01:09:02 Fumihito YOSHIDA cve linked 2009-1859
2009-06-10 01:09:30 Fumihito YOSHIDA cve linked 2009-0198
2009-06-10 01:09:36 Fumihito YOSHIDA cve linked 2009-0509
2009-06-10 01:09:44 Fumihito YOSHIDA cve linked 2009-0510
2009-06-10 01:09:53 Fumihito YOSHIDA cve linked 2009-0511
2009-06-10 01:10:01 Fumihito YOSHIDA cve linked 2009-0512
2009-06-10 01:10:10 Fumihito YOSHIDA cve linked 2009-0888
2009-06-10 01:10:17 Fumihito YOSHIDA cve linked 2009-0889
2009-06-10 01:10:25 Fumihito YOSHIDA cve linked 2009-1861
2009-06-17 03:35:28 Fumihito YOSHIDA attachment added patch to 9.1.2 http://launchpadlibrarian.net/28012376/diff_9-1-1_to_9-1-2
2009-08-03 04:48:43 Fumihito YOSHIDA ubuntu-jp-improvement: status Confirmed Fix Released