wordnet (1:3.0-6ubuntu0.1) hardy-security; urgency=low

  * SECURITY UPDATE: Stack overflows fed via the command line, environment
    variables or WordNet library calls can result in arbitrary code
    execution. (Closes LP: #257067)
  * 50_CVE-2008-2149_buffer_overflows.dpatch:
    - buffer overflow patch ( [EMAIL PROTECTED] (tille: 0) ).
  * 51_overflows.dpatch:
    - ocert patch to address additional potential security exploits.
  * 51_overflows_memcpy.dpatch:
    - Fix part of oCERT patch that breaks 'wordnet test -synsn'.
  * References
    http://www.ocert.org/advisories/ocert-2008-014.html
    CVE-2008-2149


** Changed in: wordnet (Ubuntu Feisty)
       Status: Fix Committed => Fix Released

** Changed in: wordnet (Ubuntu Hardy)
       Status: Fix Committed => Fix Released

-- 
[CVE-2008-2149] wordnet 2.0, 2.1, 3 affected by multiple buffer overflows
https://bugs.launchpad.net/bugs/267067
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to