Home > Security > Advisories

Advisories

Mandriva Advisories

Package name t1lib
Date September 27th, 2007
Advisory ID MDKSA-2007:189
Affected versions CS3.0, 2007.0, CS4.0, 2007.1
Synopsis Updated t1lib packages fix vulnerability

Problem Description

A buffer overflow vulnerability was discovered in t1lib due to improper
bounds checking. An attacker could send specially crafted input to
an application linked against t1lib which could lead to a denial of
service or the execution of arbitrary code.

Updated packages have been patched to prevent this issue.

Updated Packages

Corporate Server 3.0

 5e28c2db10fa85c05884c1f3f4b229b8  corporate/3.0/i586/t1lib1-1.3.1-14.1.C30mdk.i586.rpm
 7d1a89a7ccf9a95245094668d678a990  corporate/3.0/i586/t1lib1-devel-1.3.1-14.1.C30mdk.i586.rpm
 6e7366963e47c402b12c278cb346b170  corporate/3.0/i586/t1lib1-progs-1.3.1-14.1.C30mdk.i586.rpm
 ac8c1033158e14036a439459b608f12e  corporate/3.0/i586/t1lib1-static-devel-1.3.1-14.1.C30mdk.i586.rpm 
 287aa7fc6ee135e629fcd97689269601  corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 87dee3b68224e07431e1372af7dda010  corporate/3.0/x86_64/t1lib1-1.3.1-14.1.C30mdk.x86_64.rpm
 64158e29571d0a03d37205b9b7dcf518  corporate/3.0/x86_64/t1lib1-devel-1.3.1-14.1.C30mdk.x86_64.rpm
 4fc5b034866dce22681ca038d07fbbdf  corporate/3.0/x86_64/t1lib1-progs-1.3.1-14.1.C30mdk.x86_64.rpm
 56175b392c80058920294cf53a5ff2f7  corporate/3.0/x86_64/t1lib1-static-devel-1.3.1-14.1.C30mdk.x86_64.rpm 
 287aa7fc6ee135e629fcd97689269601  corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm

Mandriva Linux 2007

 cbdac5227208ce1ee0e3873a017fd310  2007.0/i586/libt1lib5-5.1.0-3.1mdv2007.0.i586.rpm
 1ec267053ed01a82da1e4a69e860bea7  2007.0/i586/libt1lib5-devel-5.1.0-3.1mdv2007.0.i586.rpm
 9e3536947b46739a6bebae8f27c791f6  2007.0/i586/libt1lib5-static-devel-5.1.0-3.1mdv2007.0.i586.rpm
 44a1629a984d4e8aed17fed497afb645  2007.0/i586/t1lib-config-5.1.0-3.1mdv2007.0.i586.rpm
 ffd2ec19d1b7b2248ba99dc476f0334e  2007.0/i586/t1lib-progs-5.1.0-3.1mdv2007.0.i586.rpm 
 6d3ba087bc088de95887bbb081026030  2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm

Mandriva Linux 2007/X86_64

 7302ddcd84216528f563a0afff9f13e9  2007.0/x86_64/lib64t1lib5-5.1.0-3.1mdv2007.0.x86_64.rpm
 1c9e9e376fa0c9a3999781f98b3e54c1  2007.0/x86_64/lib64t1lib5-devel-5.1.0-3.1mdv2007.0.x86_64.rpm
 3478e0036344cc60dd957ecd9b42d3e8  2007.0/x86_64/lib64t1lib5-static-devel-5.1.0-3.1mdv2007.0.x86_64.rpm
 2370d65683dbe200cea28e2809643f52  2007.0/x86_64/t1lib-config-5.1.0-3.1mdv2007.0.x86_64.rpm
 8b0f959cac3661d0a8c4d950b12f0798  2007.0/x86_64/t1lib-progs-5.1.0-3.1mdv2007.0.x86_64.rpm 
 6d3ba087bc088de95887bbb081026030  2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm

Corporate Server 4.0

 44e5d7138b23c9c727a4b73b0e77c0a4  corporate/4.0/i586/libt1lib5-5.1.0-1.1.20060mlcs4.i586.rpm
 dc674710b237a11d1c65a524fdf64c53  corporate/4.0/i586/libt1lib5-devel-5.1.0-1.1.20060mlcs4.i586.rpm
 1676db932bdb79fc8b25a7788d26b23a  corporate/4.0/i586/libt1lib5-static-devel-5.1.0-1.1.20060mlcs4.i586.rpm
 614c6e18e986a02e6a7eae5865cdb47e  corporate/4.0/i586/t1lib-config-5.1.0-1.1.20060mlcs4.i586.rpm
 32fe2bcf3481d0dabf8ddd57f8053fa4  corporate/4.0/i586/t1lib-progs-5.1.0-1.1.20060mlcs4.i586.rpm 
 58b16472c8f3a04b8d69e132b2465b55  corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm

Corporate Server 4.0/X86_64

 3163e3c97bc45d75a7c3a859bf0d9a7b  corporate/4.0/x86_64/lib64t1lib5-5.1.0-1.1.20060mlcs4.x86_64.rpm
 b939be5ac96ace080ff9d9de9825bc7e  corporate/4.0/x86_64/lib64t1lib5-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm
 130998cc75abb6b4d0f8c7497e281acf  corporate/4.0/x86_64/lib64t1lib5-static-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm
 2dfe21a41d25e4816cb988c2f9cfac91  corporate/4.0/x86_64/t1lib-config-5.1.0-1.1.20060mlcs4.x86_64.rpm
 cde552aaea2a081a5e5466477a262c20  corporate/4.0/x86_64/t1lib-progs-5.1.0-1.1.20060mlcs4.x86_64.rpm 
 58b16472c8f3a04b8d69e132b2465b55  corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm

Mandriva Linux 2007.1

 2f362838de05e2f0b47208ea0363037e  2007.1/i586/libt1lib5-5.1.1-1.1mdv2007.1.i586.rpm
 137cbab139e8eac13add031760e68168  2007.1/i586/libt1lib5-devel-5.1.1-1.1mdv2007.1.i586.rpm
 227aaeb5b35693db3de34f8f80c431c3  2007.1/i586/libt1lib5-static-devel-5.1.1-1.1mdv2007.1.i586.rpm
 236a2b2b1511736aaa303fe16bfef7f9  2007.1/i586/t1lib-config-5.1.1-1.1mdv2007.1.i586.rpm
 f1c949c7de238afaa055c8cc1350d9d7  2007.1/i586/t1lib-progs-5.1.1-1.1mdv2007.1.i586.rpm 
 3a53755fae6aa7f0cde25e535059c366  2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64

 be99aaff094fdc728b556cd89c55264b  2007.1/x86_64/lib64t1lib5-5.1.1-1.1mdv2007.1.x86_64.rpm
 9d838eba24848d3c5ba643738cddddd6  2007.1/x86_64/lib64t1lib5-devel-5.1.1-1.1mdv2007.1.x86_64.rpm
 028d704f2d58eca3241198c3c4ddced0  2007.1/x86_64/lib64t1lib5-static-devel-5.1.1-1.1mdv2007.1.x86_64.rpm
 cbc901c6517523834f6c20ff163ad0b5  2007.1/x86_64/t1lib-config-5.1.1-1.1mdv2007.1.x86_64.rpm
 25cdc40f3f64fa499c84e82aeaac2f8c  2007.1/x86_64/t1lib-progs-5.1.1-1.1mdv2007.1.x86_64.rpm 
 3a53755fae6aa7f0cde25e535059c366  2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.