This bug was fixed in the package dvipng - 1.12-3ubuntu0.1

---------------
dvipng (1.12-3ubuntu0.1) lucid-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via SetVF memory corruption
    (LP: #537638)
    - dvipng.h, draw.c, vf.c, set.c: make sure glyph index doesn't
      overflow. Patch by Jan-Ake Larsson.
    - CVE-2010-0829
 -- Marc Deslauriers <marc.deslauri...@ubuntu.com>   Tue, 27 Apr 2010 09:34:06 
-0400

** Changed in: dvipng (Ubuntu)
       Status: Confirmed => Fix Released

-- 
dvipng Memory Corruption Vulnerability
https://bugs.launchpad.net/bugs/537638
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to