Fix CVE-2008-2149: buffer overflows by limiting the length of the string in sprintf format string Closes: #481186 (CVE-2008-2149) Please note: The WordNet code contains several other occurences of potentially exploitable functions like strcpy()/strcat()/... and so even if there are no known exploits the code needs a full security audit. --- a/src/wn.c +++ b/src/wn.c @@ -206,7 +206,8 @@ static int searchwn(int ac, char *av[]) outsenses += do_search(av[1], optptr->pos, optptr->search, whichsense, optptr->label); } else { - sprintf(tmpbuf, "wn: invalid search option: %s\n", av[j]); + /* Fix CVE-2008-2149: buffer overflows Andreas Tille */ + sprintf(tmpbuf, "wn: invalid search option: %.200s\n", av[j]); display_message(tmpbuf); errcount++; } selected='selected'>koszko Wojtek's customized Guix
aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/patches/bsd-games-gamescreen.h.patch
AgeCommit message (Expand)Author
2020-11-04gnu: Add bsd-games....* gnu/packages/games.scm (bsd-games): New variable. New patches, taken from Arch and Debian: * gnu/packages/patches/bsd-games-2.17-64bit.patch * gnu/packages/patches/bsd-games-bad-ntohl-cast.patch * gnu/packages/patches/bsd-games-gamescreen.h.patch * gnu/packages/patches/bsd-games-getline.patch * gnu/packages/patches/bsd-games-null-check.patch * gnu/packages/patches/bsd-games-number.c-and-test.patch * gnu/packages/patches/bsd-games-prevent-name-collisions.patch * gnu/packages/patches/bsd-games-stdio.h.patch New patches with our customizations (configure-config built after Arch's): * gnu/packages/patches/bsd-games-add-configure-config.patch * gnu/packages/patches/bsd-games-add-wrapper.patch * gnu/packages/patches/bsd-games-dont-install-empty-files.patch Signed-off-by: Nicolas Goaziou <mail@nicolasgoaziou.fr> Vitaliy Shatrov