wordnet (1:3.0-6ubuntu0.1) hardy-security; urgency=low
* SECURITY UPDATE: Stack overflows fed via the command line, environment
variables or WordNet library calls can result in arbitrary code
execution. (Closes LP: #257067)
* 50_CVE-2008-2149_buffer_overflows.dpatch:
- buffer overflow patch ( [EMAIL PROTECTED] (tille: 0) ).
* 51_overflows.dpatch:
- ocert patch to address additional potential security exploits.
* 51_overflows_memcpy.dpatch:
- Fix part of oCERT patch that breaks 'wordnet test -synsn'.
* References
http://www.ocert.org/advisories/ocert-2008-014.html
CVE-2008-2149
** Changed in: wordnet (Ubuntu Feisty)
Status: Fix Committed => Fix Released
** Changed in: wordnet (Ubuntu Hardy)
Status: Fix Committed => Fix Released
--
[CVE-2008-2149] wordnet 2.0, 2.1, 3 affected by multiple buffer overflows
https://bugs.launchpad.net/bugs/267067
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs