Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 09 May 2008 17:00:32 +0200
From: Pierre-Yves Rofes <py@...too.org>
To: oss-security@...ts.openwall.com
CC: wordnet@...nceton.edu
Subject: Multiples vulnerabilities in wordnet

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

 one of our users reported a buffer overflow in Wordnet:

https://bugs.gentoo.org/show_bug.cgi?id=211491

After further research it appears that there might be a lot more.
I tried to contact upstream (in CC) but didn't get any response
so far. It seems at least Debian is packaging it too, and probably
others distros. Don't know how to proceed from here, but in any case
we don't have enough manpower to do upstream's job and perform a code
audit / write a patch.


- --
Pierre-Yves Rofes
Gentoo Linux Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIJGcQuhJ+ozIKI5gRAqtLAJ9FK3N99BTuey0H6tNU2nLIYWLuyACcDs9l
m1r998k49ujhiqFYXJk9fqk=
=Zkf2
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.