** Please note that this issue is confidential and no information should be disclosed until it is made public, see "Whiteboard" for a date ** James Peach of Apple discovered a stack-based buffer overflow in cscope's handling of long file system paths. Processing a maliciously crafted source file may lead to an unexpected application termination or arbitrary code execution.
Apple provided us with a reproducer for the issue. A patch is being discussed upstream.
This is now public, please bump the version in tree.
Bumped to 15.7a. Arch teams, please stabilise.
Stable for HPPA.
Stable on alpha.
amd64/x86 stable
ppc done
ppc64 done
sparc stable
GLSA request filed.
arm/ia64/m68k/s390/sh stable
CVE-2009-0148 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0148): Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via (1) long pathnames, (2) long source-code strings, and other vectors.
CVE-2009-1577 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1577): Multiple stack-based buffer overflows in the putstring function in find.c in Cscope before 15.6 allow user-assisted remote attackers to execute arbitrary code via a long (1) function name or (2) symbol in a source-code file.
GLSA 200905-02