oss-sec mailing list archives
Multiples vulnerabilities in wordnet
From: Pierre-Yves Rofes <py () gentoo org>
Date: Fri, 09 May 2008 17:00:32 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, one of our users reported a buffer overflow in Wordnet: https://bugs.gentoo.org/show_bug.cgi?id=211491 After further research it appears that there might be a lot more. I tried to contact upstream (in CC) but didn't get any response so far. It seems at least Debian is packaging it too, and probably others distros. Don't know how to proceed from here, but in any case we don't have enough manpower to do upstream's job and perform a code audit / write a patch. - -- Pierre-Yves Rofes Gentoo Linux Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFIJGcQuhJ+ozIKI5gRAqtLAJ9FK3N99BTuey0H6tNU2nLIYWLuyACcDs9l m1r998k49ujhiqFYXJk9fqk= =Zkf2 -----END PGP SIGNATURE-----
Current thread:
- Multiples vulnerabilities in wordnet Pierre-Yves Rofes (May 09)
- Re: Multiples vulnerabilities in wordnet Ben Haskell (May 09)
- Re: Multiples vulnerabilities in wordnet Steven M. Christey (May 12)