Summary: | <dev-util/cscope-15.7a sprintf stack-based buffer overflow (CVE-2009-{0148,1577}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | emacs, vim |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://sourceforge.net/project/shownotes.php?release_id=679527&group_id=4664 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() Apple provided us with a reproducer for the issue. A patch is being discussed upstream. This is now public, please bump the version in tree. Bumped to 15.7a. Arch teams, please stabilise. Stable for HPPA. Stable on alpha. amd64/x86 stable ppc done ppc64 done sparc stable GLSA request filed. arm/ia64/m68k/s390/sh stable CVE-2009-0148 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0148): Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via (1) long pathnames, (2) long source-code strings, and other vectors. CVE-2009-1577 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1577): Multiple stack-based buffer overflows in the putstring function in find.c in Cscope before 15.6 allow user-assisted remote attackers to execute arbitrary code via a long (1) function name or (2) symbol in a source-code file. GLSA 200905-02 |