Package: tcc Version: 0.9.23-2 Severity: grave Tags: security Justification: user security hole
"XFocus Security" discovered that tcc incorrectly evaluates certain sizeof() expressions, which may lead integer overflows. Please see http://www.securityfocus.com/archive/1/archive/1/424257/100/0/threaded for details. This has been assigned CVE-2006-0635, please mention it in the changelog when fixing it. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-2-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages tcc depends on: ii libc6 2.3.5-13 GNU C Library: Shared libraries an Versions of packages tcc recommends: ii libc6-dev [libc-dev] 2.3.5-13 GNU C Library: Development Librari -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]