Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#8152 - Buffer overflow bug in t1lib 5.1.0
Attached to Project:
Arch Linux
Opened by Hussam Al-Tayeb (hussam) - Friday, 28 September 2007, 00:30 GMT
Last edited by Roman Kyrylych (Romashka) - Wednesday, 31 October 2007, 08:32 GMT
Opened by Hussam Al-Tayeb (hussam) - Friday, 28 September 2007, 00:30 GMT
Last edited by Roman Kyrylych (Romashka) - Wednesday, 31 October 2007, 08:32 GMT
|
Details http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033
The latest upstream version 5.1.1 is also affected by this bug There is a patch here http://lists.debian.org/debian-security/2007/09/msg00022.html which applies to our 5.1.0. I'm sure if this bug even affects our use of t1lib because the link mentions some php stuff but I thought I would report it anyway. |
This task depends upon
Closed by Roman Kyrylych (Romashka)
Wednesday, 31 October 2007, 08:32 GMT
Reason for closing: Deferred
Wednesday, 31 October 2007, 08:32 GMT
Reason for closing: Deferred