Package: gv Version: 1:3.6.2-1 Severity: grave Tags: security Justification: user security hole
A vulnerability has been found in gv. From http://secunia.com/advisories/22787/ : "Renaud Lifchitz has reported a vulnerability in GNU gv, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the "ps_gettext()" function in ps.c. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted PostScript file. The vulnerability is reported in version 3.6.2. Other versions may also be affected." More information is at http://sysdream.com/article.php?story_id=258§ion_id=78 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]