Your message dated Fri, 16 May 2008 13:02:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#481186: fixed in wordnet 1:3.0-10
has caused the Debian Bug report #481186,
regarding CVE-2008-2149: buffer overflows
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
481186: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481186
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: wordnet
Severity: grave
Tags: security
Justification: user security hole

Hi

The following CVE(0) has been issued against wordnet.

CVE-2008-2149:

Stack-based buffer overflow in the searchwn function in Wordnet 2.0,
2.1, and 3.0 might allow context-dependent attackers to execute
arbitrary code via a long command line option. NOTE: this issue probably
does not cross privilege boundaries except in cases in which Wordnet is
used as a back end.

More information can be found in the gentoo bugreport(1).
I filled it as an RC bug, because wordnet is sometimes used as a backend
for web applications


Please mention the CVE id in your changelog, when you fix this bug.

Cheers
Steffen

(0): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2149

(1): https://bugs.gentoo.org/show_bug.cgi?id=211491



--- End Message ---
--- Begin Message ---
Source: wordnet
Source-Version: 1:3.0-10

We believe that the bug you reported is fixed in the latest version of
wordnet, which is due to be installed in the Debian FTP archive:

dict-wn_3.0-10_all.deb
  to pool/main/w/wordnet/dict-wn_3.0-10_all.deb
wordnet-base_3.0-10_all.deb
  to pool/main/w/wordnet/wordnet-base_3.0-10_all.deb
wordnet-dev_3.0-10_i386.deb
  to pool/main/w/wordnet/wordnet-dev_3.0-10_i386.deb
wordnet-grind_3.0-10_i386.deb
  to pool/main/w/wordnet/wordnet-grind_3.0-10_i386.deb
wordnet-sense-index_3.0-10_all.deb
  to pool/main/w/wordnet/wordnet-sense-index_3.0-10_all.deb
wordnet_3.0-10.diff.gz
  to pool/main/w/wordnet/wordnet_3.0-10.diff.gz
wordnet_3.0-10.dsc
  to pool/main/w/wordnet/wordnet_3.0-10.dsc
wordnet_3.0-10_i386.deb
  to pool/main/w/wordnet/wordnet_3.0-10_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Tille <[EMAIL PROTECTED]> (supplier of updated wordnet package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 15 May 2008 14:20:57 +0200
Source: wordnet
Binary: wordnet wordnet-dev wordnet-base wordnet-sense-index wordnet-grind 
dict-wn
Architecture: source all i386
Version: 1:3.0-10
Distribution: unstable
Urgency: high
Maintainer: Andreas Tille <[EMAIL PROTECTED]>
Changed-By: Andreas Tille <[EMAIL PROTECTED]>
Description: 
 dict-wn    - electronic lexical database of English language for dict
 wordnet    - electronic lexical database of English language
 wordnet-base - electronic lexical database of English language
 wordnet-dev - electronic lexical database of English language
 wordnet-grind - WordNet lexicographer files processor
 wordnet-sense-index - electronic lexical database of English language
Closes: 481186
Changes: 
 wordnet (1:3.0-10) unstable; urgency=high
 .
   * Fix CVE-2008-2149: buffer overflows by limiting the length
     of the string in sprintf format string
     Closes: #481186
     Please note: The WordNet code contains several other occurences
     of potentially exploitable functions like strcpy()/strcat()/...
     and so even if there are no known exploits the code needs a
     full security audit.
   * Mentioned the potential security issues in README.Debian
Checksums-Sha1: 
 877fca56c3ac4b217cdf55f89c56b14798bfd107 1227 wordnet_3.0-10.dsc
 ff8507333e165283a960ac769db62fb4e1ba0e16 68038 wordnet_3.0-10.diff.gz
 e7e671b1abce7422d9aaf6296ad1d9730fefdaee 8759496 wordnet-base_3.0-10_all.deb
 a82a66c017d26ea50cfad2acbec5886e855ce414 2241376 
wordnet-sense-index_3.0-10_all.deb
 15c9f9224731f2e3d89caf6e63deda14c2f82204 10893236 dict-wn_3.0-10_all.deb
 87570974f02f518e8ebd4c5d7554c270d06c1102 104074 wordnet_3.0-10_i386.deb
 9110e4fbf5a30176d3625edcb33f4d808ad666a4 61316 wordnet-dev_3.0-10_i386.deb
 15c59c768d15e389f843d1ef5710d2b420afd3ef 40916 wordnet-grind_3.0-10_i386.deb
Checksums-Sha256: 
 3f35eec4645acbf0ed87c9704dd4b27be24d3c6deb9f82974ef6cc462a21919a 1227 
wordnet_3.0-10.dsc
 3c2f1c1e15f4eb54ec39315e9bf2327d7ca61711baf15d949183ddcece297c9f 68038 
wordnet_3.0-10.diff.gz
 9bc884b844dd5ea3de93ee3171a7334dc8e2fba9417feabed7277694bd2de1d8 8759496 
wordnet-base_3.0-10_all.deb
 39e996e1a2ce90f7683e121bd24356051d3f575dd87e2e016d7a95712d26616f 2241376 
wordnet-sense-index_3.0-10_all.deb
 71634b25150b035bb407d1f97f3ad17ac59c0119a2460774b01d2c23a74e4f45 10893236 
dict-wn_3.0-10_all.deb
 f16458352bf0b1565d0afafc0d7e24805241eb74661a3e4630a5c4b06094bf1a 104074 
wordnet_3.0-10_i386.deb
 3a9452beb9541f3165dea3dcfe4936a0811804666ac04406d8b0bf4283ce68c6 61316 
wordnet-dev_3.0-10_i386.deb
 529fd03362227a2095070178e9766104c7e206eaa2d03c6c285359363bb96289 40916 
wordnet-grind_3.0-10_i386.deb
Files: 
 10934dc8536f76c16402a05849db7c9e 1227 text optional wordnet_3.0-10.dsc
 108ca9c7c738fe7c6a8d63b9757c61d4 68038 text optional wordnet_3.0-10.diff.gz
 57a88da8a5e291637a7aafabb8045ea7 8759496 text optional 
wordnet-base_3.0-10_all.deb
 685e2aa8e2adfd5f1ecc26177ca0368e 2241376 text extra 
wordnet-sense-index_3.0-10_all.deb
 8ba0754d8442541279e65971dfd84cd4 10893236 text optional dict-wn_3.0-10_all.deb
 3085204765ee84c6a4af4c49fbc9e151 104074 text optional wordnet_3.0-10_i386.deb
 d12a8a6f02206b0cf2576a892c39bf6c 61316 devel optional 
wordnet-dev_3.0-10_i386.deb
 f10c10a5aa4bdaba562ab878b9b735cb 40916 text extra wordnet-grind_3.0-10_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFILYKMYDBbMcCf01oRAmMhAJ9MQsn1aS6VDXip9DrSnx4ZbYFsUgCgjs5Q
S9FCFUewXCGKXLmCu1ujLkI=
=f7fq
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to