Branches for Edgy

Name Status Last Modified Last Commit
lp:ubuntu/edgy/tetex-bin 1 Development 2010-02-22 22:06:55 UTC
14. No-change upload to build against cur...

Author: Martin Pitt
Revision Date: 2006-10-12 17:10:33 UTC

No-change upload to build against current Poppler. This resolves the
'undefined symbol: _ZN4Dict3addERK10UGooStringP6Object' pdfetex failure
(which breaks texinfo, which in turn causes various FTBFSes).

lp:ubuntu/edgy-security/tetex-bin 1 Development 2010-02-22 22:07:25 UTC
15. * SECURITY UPDATE: improper bounds on...

Author: Jamie Strandboge
Revision Date: 2007-12-04 14:05:54 UTC

* SECURITY UPDATE: improper bounds on static buffer results in stack-based
  buffer overflow
* debian/patches/SECURITY_CVE-2007-5935.patch: make sure tmpbuf is allocated
  enough memory in texk/dvipsk/hps.c
* SECURITY UPDATE: temporary file race condition in dviljk due to use of
  tmpnam()
* SECURITY UPDATE: various buffer overflows in dviljk due to not checking
  memory boundaries
* debian/patches/SECURITY_CVE-2007-5936+5937.patch: use mkdtemp() if
  available in dvi2xx.c. Replace calls to strcpy() and do proper bounds
  checking in dvi2xx.*.
* References
  CVE-2007-5935
  CVE-2007-5936
  CVE-2007-5937

lp:ubuntu/edgy-updates/tetex-bin 1 Development 2010-02-22 22:07:53 UTC
15. * SECURITY UPDATE: improper bounds on...

Author: Jamie Strandboge
Revision Date: 2007-12-04 14:05:54 UTC

* SECURITY UPDATE: improper bounds on static buffer results in stack-based
  buffer overflow
* debian/patches/SECURITY_CVE-2007-5935.patch: make sure tmpbuf is allocated
  enough memory in texk/dvipsk/hps.c
* SECURITY UPDATE: temporary file race condition in dviljk due to use of
  tmpnam()
* SECURITY UPDATE: various buffer overflows in dviljk due to not checking
  memory boundaries
* debian/patches/SECURITY_CVE-2007-5936+5937.patch: use mkdtemp() if
  available in dvi2xx.c. Replace calls to strcpy() and do proper bounds
  checking in dvi2xx.*.
* References
  CVE-2007-5935
  CVE-2007-5936
  CVE-2007-5937

13 of 3 results