t1lib (5.1.0-2ubuntu0.7.04.1) feisty-security; urgency=low

  * SECURITY UPDATE: improper bounds checking for call to strcat results in
    buffer overflow
  * Added inline patch to lib/t1lib/t1env.c for proper bounds checking
  * References
    CVE-2007-4033
    LP: #140665
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

 -- Jamie Strandboge <[EMAIL PROTECTED]>   Tue, 18 Sep 2007 14:25:28
-0400

-- 
[Sync request] Sync t1lib (5.1.0-3) from Debian unstable main
https://bugs.launchpad.net/bugs/140665
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to