t1lib (5.1.0-2ubuntu0.7.04.1) feisty-security; urgency=low
* SECURITY UPDATE: improper bounds checking for call to strcat results in
buffer overflow
* Added inline patch to lib/t1lib/t1env.c for proper bounds checking
* References
CVE-2007-4033
LP: #140665
* Modify Maintainer value to match the DebianMaintainerField
specification.
-- Jamie Strandboge <[EMAIL PROTECTED]> Tue, 18 Sep 2007 14:25:28
-0400
--
[Sync request] Sync t1lib (5.1.0-3) from Debian unstable main
https://bugs.launchpad.net/bugs/140665
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs