t1lib
Page content
- Author: voroskoi
- Vulnerable: 5.1.1-1
- Unaffected: 5.1.1-2terminus1
Hamid Ebadi has reported a vulnerability in t1lib, which can be exploited by malicious users to potentially compromise a vulnerable system. The vulnerability is caused due to a boundary error within the “intT1_EnvGetCompletePath()” function in lib/t1lib/t1env.c. This can be exploited to cause a buffer overflow when an application processes an overly long string in the “FileName” parameter.
- Bug Tracker URL: http://bugs.frugalware.org/task/2297