Date: Fri, 09 May 2008 17:00:32 +0200 From: Pierre-Yves Rofes <py@...too.org> To: oss-security@...ts.openwall.com CC: wordnet@...nceton.edu Subject: Multiples vulnerabilities in wordnet -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, one of our users reported a buffer overflow in Wordnet: https://bugs.gentoo.org/show_bug.cgi?id=211491 After further research it appears that there might be a lot more. I tried to contact upstream (in CC) but didn't get any response so far. It seems at least Debian is packaging it too, and probably others distros. Don't know how to proceed from here, but in any case we don't have enough manpower to do upstream's job and perform a code audit / write a patch. - -- Pierre-Yves Rofes Gentoo Linux Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFIJGcQuhJ+ozIKI5gRAqtLAJ9FK3N99BTuey0H6tNU2nLIYWLuyACcDs9l m1r998k49ujhiqFYXJk9fqk= =Zkf2 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.