wv 1.0.2-0.1ubuntu0.5.10 source package in Ubuntu

Changelog

wv (1.0.2-0.1ubuntu0.5.10) breezy-security; urgency=low

  * SECURITY UPDATE: integer overflow allowed arbitrary code execution from
    malicious Word documents.
  * lfo.c, wvConfig.c: check bounds on multiplication.  Patch from upstream.
  * References
    CVE-2006-4513

 -- Kees Cook <email address hidden>   Mon, 30 Oct 2006 15:42:32 -0800

Upload details

Uploaded by:
Kees Cook
Uploaded to:
Breezy
Original maintainer:
Matej Vela
Architectures:
any
Section:
text
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
wv_1.0.2.orig.tar.gz 824.2 KiB 826100ba692da1df81237af944b1ad624b30c5a9996264f8cfaca9bc146509cd
wv_1.0.2-0.1ubuntu0.5.10.diff.gz 15.9 KiB 714316cd6eecea969da0c778981f88b17ec53b58376851ae42d5922ff38d18d0
wv_1.0.2-0.1ubuntu0.5.10.dsc 629 bytes 4fd99b4412d235bd015726580f3607461d987131224f2817b86977f208d8c79c

View changes file

Binary packages built by this source

wv: No summary available for wv in ubuntu breezy.

No description available for wv in ubuntu breezy.