Package: cscope Version: 15.5+cvs20050816-1 Severity: grave Tags: security Justification: user security hole
Source code with overly long file names in #include statements may trigger a buffer overflow and permit arbitrary code execution. Please see http://sourceforge.net/tracker/index.php?func=detail&aid=1064875&group_id=4664&atid=104664 for details. As cscope is a tool frequently used to study external code from untrusted sources this seems like a valid attack vector to me, thus the RC severity. If you disagree, feel free to lower the severity. This has been assigned CVE-2004-2541, please mention it in the changelog when fixing this. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-2-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages cscope depends on: ii libc6 2.3.5-8 GNU C Library: Shared libraries an ii libncurses5 5.5-1 Shared libraries for terminal hand cscope recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]