=========================================================== 
Ubuntu Security Notice USN-515-1         September 19, 2007
t1lib vulnerability
CVE-2007-4033
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libt1-5                         5.1.0-2ubuntu0.6.06.1

Ubuntu 6.10:
  libt1-5                         5.1.0-2ubuntu0.6.10.1

Ubuntu 7.04:
  libt1-5                         5.1.0-2ubuntu0.7.04.1

In general, a standard system upgrade is sufficient to affect the
necessary changes.

Details follow:

It was discovered that t1lib does not properly perform bounds checking
which can result in a buffer overflow vulnerability.  An attacker could
send specially crafted input to applications linked against t1lib which
could result in a DoS or arbitrary code execution.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

          Size/MD5:    13706 d9ce103e87af790c5225b09bb03d7385
          Size/MD5:      730 8de933312806448123594efa12bf5cc6
          Size/MD5:  1838635 a05bed4aa63637052e60690ccde70421

  Architecture independent packages:

          Size/MD5:   608928 07320bc9fab519b6cd8dbcd319b09d41

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   161724 ca9c66df61dae2f76375742d2530503f
          Size/MD5:   192954 cda5eca98bc7464350edb7d17ff3f279
          Size/MD5:    59342 29ccd99dd546473f7fcc07f27f908606

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   140408 0ec3be1685e83742033c0900a1b64a01
          Size/MD5:   165518 1a55f8734bbdc58151d9b4b17f46dfbe
          Size/MD5:    53286 8e2c1031785c1a13190c6802a45ba063

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   156412 53a5770038a14407944a86550e0a2fd2
          Size/MD5:   205980 8c2a48d82f12e8f7ec571854fcca3017
          Size/MD5:    54134 d78df8d6e9cdd9f3121386eb31dc3a1f

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   152790 314234020da17d3e68fa69c38e0eb38b
          Size/MD5:   190472 d69c5aa2d085380b27da2ac72abacf66
          Size/MD5:    55842 8610e26e19137d02180f7815576581b7

Updated packages for Ubuntu 6.10:

  Source archives:

          Size/MD5:    13722 e6ab67a2a5bc7117870b14c1f4bb3369
          Size/MD5:      730 bc5cb1797c225c7c916acae84de33b48
          Size/MD5:  1838635 a05bed4aa63637052e60690ccde70421

  Architecture independent packages:

          Size/MD5:   608968 ef34d3b6c3c59710c19bc7e6641a2c20

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   159858 e603e28bd73fcff74a451eb6b57ff0bb
          Size/MD5:   191042 2f1a62881dd960e18ff39768f244f9d2
          Size/MD5:    59230 4f1f7d130d602c57e562ebb35d239b21

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   144432 fb141c326b3123ea65aa854fc7665866
          Size/MD5:   169758 19f31c36af6bdfba26e1208c39fc66c8
          Size/MD5:    53190 7b303362b227c0371af4b026c7148572

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   156066 80e45861de1bc2406b45c30c23bc3033
          Size/MD5:   205860 b48b7054189d15e4777b67799f2fa2e8
          Size/MD5:    55120 82e6be926434ebd0b98aa4241aa96c77

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   153334 6765c87f8cfe73b6aab375d1a919ca1b
          Size/MD5:   191080 b0b298207b519b2f7a183255471f6906
          Size/MD5:    55598 236347f949366e2c9a53bb875328b369

Updated packages for Ubuntu 7.04:

  Source archives:

          Size/MD5:    13778 2d18ded62941fe63cf07cea11b94c473
          Size/MD5:      814 5f6115c702fc0f4cbc2921dd634d52b1
          Size/MD5:  1838635 a05bed4aa63637052e60690ccde70421

  Architecture independent packages:

          Size/MD5:   609006 c1b94d42f80cf0872c16803f35708e66

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   162000 93299291d55d1d766c56d39b4b0798cb
          Size/MD5:   191176 6ec71612dc9565b434ed22db4ae05abe
          Size/MD5:    60170 a812326450f93a0163919726f7e02a15

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   146962 257494ee2f5eaa3a4e26c3421c330746
          Size/MD5:   169794 048e0b6a507071578ab91b19208ca38c
          Size/MD5:    54696 819cb56786b7556a1d8a561fbd88a6ef

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   162466 ef11b5d8956475e4bc79faec7bac4607
          Size/MD5:   205674 b1d0b8c09f86721d81363f0c560efb83
          Size/MD5:    58292 1fabfed321d1d7b732aed3b5fcc0a501

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   155778 7f916ff82c6d05c995a4ce76d130703f
          Size/MD5:   191048 517dbfb86bf112e634c2681591ed1628
          Size/MD5:    57492 542e025fa07660a20d322681a61de387


Ubuntu: t1lib vulnerability

September 19, 2007
It was discovered that t1lib does not properly perform bounds checking which can result in a buffer overflow vulnerability

Summary

Update Instructions

References

Severity
Ubuntu Security Notice USN-515-1 September 19, 2007

Package Information

Related News