I wrote a DSA draft, check it please.

BTW, JVN's workaround is not correct. There is also the same problem
in ChaSen 2.3.3.

-- 
DSA-xxxx-1 chasen -- buffer overflow

Affected Packages:
libchasen2
libchasen-dev
libtext-chasen-perl

Vulnerable:
Yes

Security database references:
In Mitre's CVE dictionary: CVE-2011-4000
In the Japan Vulnerability Notes: JVN16901583 
<http://jvn.jp/en/jp/JVN16901583/index.html>

More information:

It was discovered that buffer overflow in ChaSen's processing of Japanese 
string parsing in memory.
It only affects chasen_sparse_tosrt function, and not chasen command and other 
parsing function like chasen_fparse_tostr.

There is a workaround to use chasen command via pipe, instead of 
chasen_sparse_tostr function.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to