* SECURITY UPDATE: improper bounds checking for call to strcat results in
buffer overflow
* Added inline patch to lib/t1lib/t1env.c for proper bounds checking
* References
CVE-2007-4033
LP: #140665
* Modify Maintainer value to match the DebianMaintainerField
specification.
t1lib (5.1.0- 2ubuntu0. 7.04.1) feisty-security; urgency=low
* SECURITY UPDATE: improper bounds checking for call to strcat results in rField
buffer overflow
* Added inline patch to lib/t1lib/t1env.c for proper bounds checking
* References
CVE-2007-4033
LP: #140665
* Modify Maintainer value to match the DebianMaintaine
specification.
-- Jamie Strandboge <email address hidden> Tue, 18 Sep 2007 14:25:28 -0400