Debian Bug report logs - #528510
cscope: CVE-2009-0148 multiple buffer overflows

version graph

Package: cscope; Maintainer for cscope is Tobias Klauser <>; Source for cscope is src:cscope.

Reported by: Nico Golde <>

Date: Wed, 13 May 2009 11:06:04 UTC

Severity: grave

Tags: security

Fixed in version cscope/15.7a-1

Done: Tobias Klauser <>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox

Report forwarded to, Tobias Klauser <>:
Bug#528510; Package cscope. (Wed, 13 May 2009 11:06:06 GMT) Full text and rfc822 format available.

Acknowledgement sent to Nico Golde <>:
New Bug report received and forwarded. Copy sent to Tobias Klauser <>. (Wed, 13 May 2009 11:06:06 GMT) Full text and rfc822 format available.

Message #5 received at (full text, mbox):

From: Nico Golde <>
Subject: cscope: CVE-2009-0148 multiple buffer overflows
Date: Wed, 13 May 2009 13:02:06 +0200
[Message part 1 (text/plain, inline)]
Package: cscope
Severity: grave
Tags: security

the following CVE (Common Vulnerabilities & Exposures) id was
published for cscope.

| Multiple buffer overflows in Cscope before 15.7a allow remote
| attackers to execute arbitrary code via long strings in input such as
| (1) source-code tokens and (2) pathnames, related to integer overflows
| in some cases. NOTE: this issue exists because of an incomplete fix
| for CVE-2004-2541.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:


Nico Golde - - - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Reply sent to Tobias Klauser <>:
You have taken responsibility. (Tue, 09 Jun 2009 12:36:07 GMT) Full text and rfc822 format available.

Notification sent to Nico Golde <>:
Bug acknowledged by developer. (Tue, 09 Jun 2009 12:36:07 GMT) Full text and rfc822 format available.

Message #10 received at (full text, mbox):

From: Tobias Klauser <>
Subject: Bug#528510: fixed in cscope 15.7a-1
Date: Tue, 09 Jun 2009 12:17:10 +0000
Source: cscope
Source-Version: 15.7a-1

We believe that the bug you reported is fixed in the latest version of
cscope, which is due to be installed in the Debian FTP archive:

  to pool/main/c/cscope/cscope_15.7a-1.diff.gz
  to pool/main/c/cscope/cscope_15.7a-1.dsc
  to pool/main/c/cscope/cscope_15.7a-1_i386.deb
  to pool/main/c/cscope/cscope_15.7a.orig.tar.gz

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Tobias Klauser <> (supplier of updated cscope package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing

Hash: SHA1

Format: 1.8
Date: Sun, 24 May 2009 12:13:47 +0200
Source: cscope
Binary: cscope
Architecture: source i386
Version: 15.7a-1
Distribution: unstable
Urgency: high
Maintainer: Tobias Klauser <>
Changed-By: Tobias Klauser <>
 cscope     - Interactively examine a C program source
Closes: 515164 528510
 cscope (15.7a-1) unstable; urgency=high
   * New upstream release.
     - Security update for CVE-2009-0148 to fix multiple buffer overflows
       (Closes: #528510).
     - Drop 01-fix-resize-crash-inside-vim.dpatch, merged upstream.
   * Correctly install xcscope.el via dh_installemacsen (Closes: #515164).
   * Update to Standards-Version 3.8.1, no changes needed.
 c8639b506d3ee332858005d17cbf95ad9d3093ed 1149 cscope_15.7a-1.dsc
 33d3dd36dcca95ce199d2ad07d7fa9fce2e9a6f9 429251 cscope_15.7a.orig.tar.gz
 e008766343ea64ddb0edd621281b86fe7494c1ac 16951 cscope_15.7a-1.diff.gz
 11ad2a03d3b35c444d0f8fa3a4cc83d1128fcd6a 153178 cscope_15.7a-1_i386.deb
 2804ca570f12af4637a6db2356e34b4ccc07f26dd1f5cfc8a8d171ba86fafd6f 1149 cscope_15.7a-1.dsc
 1f04362e865b9ab2b470f0845531111881e76b55f68d7892b15ddbc38641fe26 429251 cscope_15.7a.orig.tar.gz
 e25fd9c86fe8dc464b8409aa76a0bb5cfba534f1599409aa8bd71e2dcb156376 16951 cscope_15.7a-1.diff.gz
 d5157e663cba6ca965c47dd868cdab591a365853b7311f52eec6060320652204 153178 cscope_15.7a-1_i386.deb
 4896c50a763f012c3a4bb72c2812742e 1149 devel optional cscope_15.7a-1.dsc
 90d1b66dafa355307195c7153cec6d5c 429251 devel optional cscope_15.7a.orig.tar.gz
 018a295298250bec6cc09e717a90a7f9 16951 devel optional cscope_15.7a-1.diff.gz
 652128d8315683ee56849da1248bb426 153178 devel optional cscope_15.7a-1_i386.deb

Version: GnuPG v1.4.9 (GNU/Linux)


Bug archived. Request was from Debbugs Internal Request <> to (Fri, 10 Jul 2009 07:27:15 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.

Debian bug tracking system administrator <>. Last modified: Fri Apr 18 10:51:09 2014; Machine Name:

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.