Fix CVE-2008-2149: buffer overflows by limiting the length of the string in sprintf format string Closes: #481186 (CVE-2008-2149) Please note: The WordNet code contains several other occurences of potentially exploitable functions like strcpy()/strcat()/... and so even if there are no known exploits the code needs a full security audit. --- a/src/wn.c +++ b/src/wn.c @@ -206,7 +206,8 @@ static int searchwn(int ac, char *av[]) outsenses += do_search(av[1], optptr->pos, optptr->search, whichsense, optptr->label); } else { - sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille */ + sprintf(tmpbuf, "wn: invalid search option: %.200s\n", av[j]); display_message(tmpbuf); errcount++; } ion> Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/README
AgeCommit message (Expand)Author
2021-05-20The #guix channel is hosted by Libera Chat....* README (Contact): Update network name. * ROADMAP: Likewise. * doc/contributing.texi (Contributing): Likewise. * doc/guix.texi (After System Installation): Likewise. Tobias Geerinckx-Rice
2020-10-23doc: Update README....* README (Installation): Do not mention installing Guix from Git anymore. (Building from Git): Add section. Maxim Cournoyer
2020-10-22README: Refer to the manual for building from Git....* README (Installing Guix from Guix): Remove section. (Installation): For installing from Git, refer to the "Building from Git" section of the manual and suggest using './pre-inst-env guix pull' rather than 'make install' for installing Guix. Maxim Cournoyer