This bug was fixed in the package dvipng - 1.12-3ubuntu0.1
---------------
dvipng (1.12-3ubuntu0.1) lucid-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via SetVF memory corruption
(LP: #537638)
- dvipng.h, draw.c, vf.c, set.c: make sure glyph index doesn't
overflow. Patch by Jan-Ake Larsson.
- CVE-2010-0829
-- Marc Deslauriers <[email protected]> Tue, 27 Apr 2010 09:34:06
-0400
** Changed in: dvipng (Ubuntu)
Status: Confirmed => Fix Released
--
dvipng Memory Corruption Vulnerability
https://bugs.launchpad.net/bugs/537638
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs