Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A buffer overflow vulnerability was discovered in t1lib due to improper
bounds checking. An attacker could send specially crafted input to
an application linked against t1lib which could lead to a denial of
service or the execution of arbitrary code.
Updated packages have been patched to prevent this issue.
Updated Packages |
Corporate Server 3.0
5e28c2db10fa85c05884c1f3f4b229b8 corporate/3.0/i586/t1lib1-1.3.1-14.1.C30mdk.i586.rpm 7d1a89a7ccf9a95245094668d678a990 corporate/3.0/i586/t1lib1-devel-1.3.1-14.1.C30mdk.i586.rpm 6e7366963e47c402b12c278cb346b170 corporate/3.0/i586/t1lib1-progs-1.3.1-14.1.C30mdk.i586.rpm ac8c1033158e14036a439459b608f12e corporate/3.0/i586/t1lib1-static-devel-1.3.1-14.1.C30mdk.i586.rpm 287aa7fc6ee135e629fcd97689269601 corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
87dee3b68224e07431e1372af7dda010 corporate/3.0/x86_64/t1lib1-1.3.1-14.1.C30mdk.x86_64.rpm 64158e29571d0a03d37205b9b7dcf518 corporate/3.0/x86_64/t1lib1-devel-1.3.1-14.1.C30mdk.x86_64.rpm 4fc5b034866dce22681ca038d07fbbdf corporate/3.0/x86_64/t1lib1-progs-1.3.1-14.1.C30mdk.x86_64.rpm 56175b392c80058920294cf53a5ff2f7 corporate/3.0/x86_64/t1lib1-static-devel-1.3.1-14.1.C30mdk.x86_64.rpm 287aa7fc6ee135e629fcd97689269601 corporate/3.0/SRPMS/t1lib-1.3.1-14.1.C30mdk.src.rpm
Mandriva Linux 2007
cbdac5227208ce1ee0e3873a017fd310 2007.0/i586/libt1lib5-5.1.0-3.1mdv2007.0.i586.rpm 1ec267053ed01a82da1e4a69e860bea7 2007.0/i586/libt1lib5-devel-5.1.0-3.1mdv2007.0.i586.rpm 9e3536947b46739a6bebae8f27c791f6 2007.0/i586/libt1lib5-static-devel-5.1.0-3.1mdv2007.0.i586.rpm 44a1629a984d4e8aed17fed497afb645 2007.0/i586/t1lib-config-5.1.0-3.1mdv2007.0.i586.rpm ffd2ec19d1b7b2248ba99dc476f0334e 2007.0/i586/t1lib-progs-5.1.0-3.1mdv2007.0.i586.rpm 6d3ba087bc088de95887bbb081026030 2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
7302ddcd84216528f563a0afff9f13e9 2007.0/x86_64/lib64t1lib5-5.1.0-3.1mdv2007.0.x86_64.rpm 1c9e9e376fa0c9a3999781f98b3e54c1 2007.0/x86_64/lib64t1lib5-devel-5.1.0-3.1mdv2007.0.x86_64.rpm 3478e0036344cc60dd957ecd9b42d3e8 2007.0/x86_64/lib64t1lib5-static-devel-5.1.0-3.1mdv2007.0.x86_64.rpm 2370d65683dbe200cea28e2809643f52 2007.0/x86_64/t1lib-config-5.1.0-3.1mdv2007.0.x86_64.rpm 8b0f959cac3661d0a8c4d950b12f0798 2007.0/x86_64/t1lib-progs-5.1.0-3.1mdv2007.0.x86_64.rpm 6d3ba087bc088de95887bbb081026030 2007.0/SRPMS/t1lib-5.1.0-3.1mdv2007.0.src.rpm
Corporate Server 4.0
44e5d7138b23c9c727a4b73b0e77c0a4 corporate/4.0/i586/libt1lib5-5.1.0-1.1.20060mlcs4.i586.rpm dc674710b237a11d1c65a524fdf64c53 corporate/4.0/i586/libt1lib5-devel-5.1.0-1.1.20060mlcs4.i586.rpm 1676db932bdb79fc8b25a7788d26b23a corporate/4.0/i586/libt1lib5-static-devel-5.1.0-1.1.20060mlcs4.i586.rpm 614c6e18e986a02e6a7eae5865cdb47e corporate/4.0/i586/t1lib-config-5.1.0-1.1.20060mlcs4.i586.rpm 32fe2bcf3481d0dabf8ddd57f8053fa4 corporate/4.0/i586/t1lib-progs-5.1.0-1.1.20060mlcs4.i586.rpm 58b16472c8f3a04b8d69e132b2465b55 corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm
Corporate Server 4.0/X86_64
3163e3c97bc45d75a7c3a859bf0d9a7b corporate/4.0/x86_64/lib64t1lib5-5.1.0-1.1.20060mlcs4.x86_64.rpm b939be5ac96ace080ff9d9de9825bc7e corporate/4.0/x86_64/lib64t1lib5-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm 130998cc75abb6b4d0f8c7497e281acf corporate/4.0/x86_64/lib64t1lib5-static-devel-5.1.0-1.1.20060mlcs4.x86_64.rpm 2dfe21a41d25e4816cb988c2f9cfac91 corporate/4.0/x86_64/t1lib-config-5.1.0-1.1.20060mlcs4.x86_64.rpm cde552aaea2a081a5e5466477a262c20 corporate/4.0/x86_64/t1lib-progs-5.1.0-1.1.20060mlcs4.x86_64.rpm 58b16472c8f3a04b8d69e132b2465b55 corporate/4.0/SRPMS/t1lib-5.1.0-1.1.20060mlcs4.src.rpm
Mandriva Linux 2007.1
2f362838de05e2f0b47208ea0363037e 2007.1/i586/libt1lib5-5.1.1-1.1mdv2007.1.i586.rpm 137cbab139e8eac13add031760e68168 2007.1/i586/libt1lib5-devel-5.1.1-1.1mdv2007.1.i586.rpm 227aaeb5b35693db3de34f8f80c431c3 2007.1/i586/libt1lib5-static-devel-5.1.1-1.1mdv2007.1.i586.rpm 236a2b2b1511736aaa303fe16bfef7f9 2007.1/i586/t1lib-config-5.1.1-1.1mdv2007.1.i586.rpm f1c949c7de238afaa055c8cc1350d9d7 2007.1/i586/t1lib-progs-5.1.1-1.1mdv2007.1.i586.rpm 3a53755fae6aa7f0cde25e535059c366 2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64
be99aaff094fdc728b556cd89c55264b 2007.1/x86_64/lib64t1lib5-5.1.1-1.1mdv2007.1.x86_64.rpm 9d838eba24848d3c5ba643738cddddd6 2007.1/x86_64/lib64t1lib5-devel-5.1.1-1.1mdv2007.1.x86_64.rpm 028d704f2d58eca3241198c3c4ddced0 2007.1/x86_64/lib64t1lib5-static-devel-5.1.1-1.1mdv2007.1.x86_64.rpm cbc901c6517523834f6c20ff163ad0b5 2007.1/x86_64/t1lib-config-5.1.1-1.1mdv2007.1.x86_64.rpm 25cdc40f3f64fa499c84e82aeaac2f8c 2007.1/x86_64/t1lib-progs-5.1.1-1.1mdv2007.1.x86_64.rpm 3a53755fae6aa7f0cde25e535059c366 2007.1/SRPMS/t1lib-5.1.1-1.1mdv2007.1.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.