Package: stlport5
Version: 5.0.0-1.1
Severity: normal
Tags: security

Good day,

>From CVE-2006-0963 :

|  Multiple buffer overflows in STLport 5.0.2 might allow local users to
|  execute arbitrary code via (1) long locale environment variables to a
|  strcpy function call in c_locale_glibc2.c and (2) long arguments to
|  unspecified functions in num_put_float.cpp.

I think this CVE entry is buggy, problem (1) is fixed in 5.0.2. 
I haven't check about problem (2) but from securityfocus[1] this is also
fixed in 5.0.2

Regards.

[1] http://www.securityfocus.com/bid/16928/solution

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to