Comment 3 for bug 140665

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

t1lib (5.1.0-2ubuntu0.7.04.1) feisty-security; urgency=low

  * SECURITY UPDATE: improper bounds checking for call to strcat results in
    buffer overflow
  * Added inline patch to lib/t1lib/t1env.c for proper bounds checking
  * References
    CVE-2007-4033
    LP: #140665
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

 -- Jamie Strandboge <email address hidden> Tue, 18 Sep 2007 14:25:28 -0400