oss-sec mailing list archives

Multiples vulnerabilities in wordnet


From: Pierre-Yves Rofes <py () gentoo org>
Date: Fri, 09 May 2008 17:00:32 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

 one of our users reported a buffer overflow in Wordnet:

https://bugs.gentoo.org/show_bug.cgi?id=211491

After further research it appears that there might be a lot more.
I tried to contact upstream (in CC) but didn't get any response
so far. It seems at least Debian is packaging it too, and probably
others distros. Don't know how to proceed from here, but in any case
we don't have enough manpower to do upstream's job and perform a code
audit / write a patch.


- --
Pierre-Yves Rofes
Gentoo Linux Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIJGcQuhJ+ozIKI5gRAqtLAJ9FK3N99BTuey0H6tNU2nLIYWLuyACcDs9l
m1r998k49ujhiqFYXJk9fqk=
=Zkf2
-----END PGP SIGNATURE-----


Current thread: