Bug#481186: CVE-2008-2149: buffer overflows - reopen

Nico Golde nion at debian.org
Sat Sep 6 10:40:48 UTC 2008


Hi Stefan,
* Stefan Lesicnik <stefan at lsd.co.za> [2008-09-06 11:46]:
> As the changelog indicates, there may still be various potential
> security flaws within this product.
> 
> http://www.ocert.org/advisories/ocert-2008-014.html
> 
> shows the release of a more comprehensive patch.
> 
> http://www.ocert.org/analysis/2008-014/wordnet.patch
> 
> Attached is the debian-debdiff to apply this. (some modification may
> be required)

This patch is included wordnet 1:3.0-12.
Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/debian-science-maintainers/attachments/20080906/41608e54/attachment.pgp 


More information about the debian-science-maintainers mailing list