wv 1.0.2-0.1ubuntu0.5.10 source package in Ubuntu
Changelog
wv (1.0.2-0.1ubuntu0.5.10) breezy-security; urgency=low * SECURITY UPDATE: integer overflow allowed arbitrary code execution from malicious Word documents. * lfo.c, wvConfig.c: check bounds on multiplication. Patch from upstream. * References CVE-2006-4513 -- Kees Cook <email address hidden> Mon, 30 Oct 2006 15:42:32 -0800
Upload details
- Uploaded by:
- Kees Cook
- Uploaded to:
- Breezy
- Original maintainer:
- Matej Vela
- Architectures:
- any
- Section:
- text
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
wv_1.0.2.orig.tar.gz | 824.2 KiB | 826100ba692da1df81237af944b1ad624b30c5a9996264f8cfaca9bc146509cd |
wv_1.0.2-0.1ubuntu0.5.10.diff.gz | 15.9 KiB | 714316cd6eecea969da0c778981f88b17ec53b58376851ae42d5922ff38d18d0 |
wv_1.0.2-0.1ubuntu0.5.10.dsc | 629 bytes | 4fd99b4412d235bd015726580f3607461d987131224f2817b86977f208d8c79c |
Binary packages built by this source
- wv: No summary available for wv in ubuntu breezy.
No description available for wv in ubuntu breezy.