Bug#481186: CVE-2008-2149: buffer overflows - reopen
Nico Golde
nion at debian.org
Sat Sep 6 10:40:48 UTC 2008
Hi Stefan,
* Stefan Lesicnik <stefan at lsd.co.za> [2008-09-06 11:46]:
> As the changelog indicates, there may still be various potential
> security flaws within this product.
>
> http://www.ocert.org/advisories/ocert-2008-014.html
>
> shows the release of a more comprehensive patch.
>
> http://www.ocert.org/analysis/2008-014/wordnet.patch
>
> Attached is the debian-debdiff to apply this. (some modification may
> be required)
This patch is included wordnet 1:3.0-12.
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/debian-science-maintainers/attachments/20080906/41608e54/attachment.pgp
More information about the debian-science-maintainers
mailing list