Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2007-4033

Publication date 27 July 2007

Last updated 24 July 2024


Ubuntu priority

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

From the Ubuntu Security Team

It was discovered that t1lib does not properly perform bounds checking which can result in a buffer overflow vulnerability. An attacker could send specially crafted input to applications linked against t1lib which could result in a DoS or arbitrary code execution.

Read the notes from the security team

Status

Package Ubuntu Release Status
t1lib 7.04 feisty
Fixed 5.1.0-2ubuntu0.7.04.1
6.10 edgy
Fixed 5.1.0-2ubuntu0.6.10.1
6.06 LTS dapper
Fixed 5.1.0-2ubuntu0.6.06.1
tetex-bin 7.10 gutsy Not in release
7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper
Not affected
texlive-bin 7.10 gutsy
Not affected
7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper Not in release

Notes


jdstrand

while tetex-bin and texlive-bin have embedded t1lib code, it's not used

References

Related Ubuntu Security Notices (USN)

    • USN-515-1
    • t1lib vulnerability
    • 19 September 2007

Other references