* gnu/packages/wordnet.scm (wordnet)[source]: Add patches. * gnu/packages/patches/wordnet-CVE-2008-2149.patch, gnu/packages/patches/wordnet-CVE-2008-3908-pt1.patch, gnu/packages/patches/wordnet-CVE-2008-3908-pt2.patch: New variables. * gnu/local.mk (dist_patch_DATA): Add them.
		
			
				
	
	
		
			19 lines
		
	
	
	
		
			807 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			19 lines
		
	
	
	
		
			807 B
		
	
	
	
		
			Diff
		
	
	
	
	
	
| Fix CVE-2008-2149: buffer overflows by limiting the length of the string in sprintf
 | |
| format string
 | |
| Closes: #481186 (CVE-2008-2149)
 | |
| Please note: The WordNet code contains several other occurences of potentially
 | |
| exploitable functions like strcpy()/strcat()/...  and so even if there are no
 | |
| known exploits the code needs a full security audit.
 | |
| 
 | |
| --- a/src/wn.c
 | |
| +++ b/src/wn.c
 | |
| @@ -206,7 +206,8 @@ static int searchwn(int ac, char *av[])
 | |
|  		    outsenses += do_search(av[1], optptr->pos, optptr->search,
 | |
|  					    whichsense, optptr->label);
 | |
|  	    } else {
 | |
| -		sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]);
 | |
| +		/* Fix CVE-2008-2149: buffer overflows Andreas Tille <tille@debian.org> */
 | |
| +		sprintf(tmpbuf, "wn: invalid search option: %.200s\n", av[j]);
 | |
|  		display_message(tmpbuf);
 | |
|  		errcount++;
 | |
|  	    }
 |