This bug was fixed in the package dvipng - 1.12-3ubuntu0.1 --------------- dvipng (1.12-3ubuntu0.1) lucid-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via SetVF memory corruption (LP: #537638) - dvipng.h, draw.c, vf.c, set.c: make sure glyph index doesn't overflow. Patch by Jan-Ake Larsson. - CVE-2010-0829 -- Marc Deslauriers <marc.deslauri...@ubuntu.com> Tue, 27 Apr 2010 09:34:06 -0400 ** Changed in: dvipng (Ubuntu) Status: Confirmed => Fix Released -- dvipng Memory Corruption Vulnerability https://bugs.launchpad.net/bugs/537638 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs