Package: tcc
Version: 0.9.23-2
Severity: grave
Tags: security
Justification: user security hole

"XFocus Security" discovered that tcc incorrectly evaluates certain sizeof()
expressions, which may lead integer overflows. Please see 
http://www.securityfocus.com/archive/1/archive/1/424257/100/0/threaded
for details.

This has been assigned CVE-2006-0635, please mention it in the changelog when
fixing it.

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages tcc depends on:
ii  libc6                         2.3.5-13   GNU C Library: Shared libraries an

Versions of packages tcc recommends:
ii  libc6-dev [libc-dev]          2.3.5-13   GNU C Library: Development Librari

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to