Summary: | dev-libs/link-grammar: buffer overflow in tokenize.c (separate_word()) (CVE-2007-5395) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Raphael Marichez (Falco) (RETIRED) <falco> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | normal | CC: | eva, joem | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://secunia.com/advisories/27300/ | ||||||
Whiteboard: | B2 [glsa] Falco | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Raphael Marichez (Falco) (RETIRED)
![]() Created attachment 135199 [details, diff]
link-grammar-CVE-2007-5395.patch
Upstream committed a patch on Oct. 27. Attached the patch and upstream log message.
revbumped in tree. Compile and pass tests fine. Arch security liaisons please test and mark stable. Target keywords are: link-grammar-4.2.4-r1.ebuild="alpha amd64 hppa ia64 ppc ppc64 sparc x86" Stable for HPPA. ppc stable Stable for SPARC (gustavoz has resigned). Adding armin for alpha ppc64 stable alpha/ia64/x86 stable Public as per $URL. Only amd64 is missing. amd64 stable GLSA request filed. GLSA 200711-27 |