* SECURITY UPDATE: Stack overflows fed via the command line, environment
variables or WordNet library calls can result in arbitrary code
execution. (Closes LP: #267067)
* 51_overflows.patch:
- ocert patch to address additional potential security exploits.
* 51_overflows_memcpy.patch:
- Fix part of oCERT patch that breaks 'wordnet test -synsn'.
* References http://www.ocert.org/advisories/ocert-2008-014.html
CVE-2008-2149
This bug was fixed in the package wordnet - 1:3.0-11ubuntu0.1
---------------
wordnet (1:3.0-11ubuntu0.1) intrepid; urgency=low
* SECURITY UPDATE: Stack overflows fed via the command line, environment memcpy. patch: www.ocert. org/advisories/ ocert-2008- 014.html
variables or WordNet library calls can result in arbitrary code
execution. (Closes LP: #267067)
* 51_overflows.patch:
- ocert patch to address additional potential security exploits.
* 51_overflows_
- Fix part of oCERT patch that breaks 'wordnet test -synsn'.
* References
http://
CVE-2008-2149
-- Stefan Lesicnik <email address hidden> Thu, 11 Sep 2008 10:45:13 +0200