LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated tk packages fix buffer overflow Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake The ReadImage() function in Tk did not check codeSize read from GIF images prior to initializing the append array, which could lead to a buffer overflow with unknown impact. The updated packages have been patched to correct this issue.
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:041
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : tk
 Date    : February 7, 2008
 Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 The ReadImage() function in Tk did not check codeSize read from GIF
 images prior to initializing the append array, which could lead to
 a buffer overflow with unknown impact.
 
 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 313a17f5bd97cfa3585e4c081980a277  2007.0/i586/libtk8.4-8.4.13-1.2mdv2007.0.i586.rpm
 0f3e50eb6d0ad4171466a77563647f06  2007.0/i586/libtk8.4-devel-8.4.13-1.2mdv2007.0.i586.rpm
 4343ad52dcaaa9c2b3a721203c55e55a  2007.0/i586/tk-8.4.13-1.2mdv2007.0.i586.rpm 
 00af2123b29298539e37a1b24d832774  2007.0/SRPMS/tk-8.4.13-1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 9c7d84dbf13a2595d97ddd4f2909d739  2007.0/x86_64/lib64tk8.4-8.4.13-1.2mdv2007.0.x86_64.rpm
 83703461ccd52243d299dd0a00611019  2007.0/x86_64/lib64tk8.4-devel-8.4.13-1.2mdv2007.0.x86_64.rpm
 16be00250d31baa14b8daaef1050a849  2007.0/x86_64/tk-8.4.13-1.2mdv2007.0.x86_64.rpm 
 00af2123b29298539e37a1b24d832774  2007.0/SRPMS/tk-8.4.13-1.2mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 59fc6defd594590a401cd16796769921  2007.1/i586/libtk8.4-8.4.14-1.2mdv2007.1.i586.rpm
 d0a31e7f5bb7f15b981c91ad8cea16ed  2007.1/i586/libtk8.4-devel-8.4.14-1.2mdv2007.1.i586.rpm
 0fd5d28dc25ff74443b1a1aa9c9f0f51  2007.1/i586/tk-8.4.14-1.2mdv2007.1.i586.rpm 
 a84a7d5dec8ce5863e6a9b95f947522c  2007.1/SRPMS/tk-8.4.14-1.2mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 38bc8310c8500041edaa37c96947c2ad  2007.1/x86_64/lib64tk8.4-8.4.14-1.2mdv2007.1.x86_64.rpm
 aa08bf6f098a79dc2c788f646891cc9c  2007.1/x86_64/lib64tk8.4-devel-8.4.14-1.2mdv2007.1.x86_64.rpm
 110f8dfe0cabf73be25c5199c6a6573a  2007.1/x86_64/tk-8.4.14-1.2mdv2007.1.x86_64.rpm 
 a84a7d5dec8ce5863e6a9b95f947522c  2007.1/SRPMS/tk-8.4.14-1.2mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 e508b67d8677e460b82fef4ca62cad11  2008.0/i586/libtk-devel-8.5a6-8.2mdv2008.0.i586.rpm
 35fce37958832c7edbf4e8f2d63c9a72  2008.0/i586/libtk8.5-8.5a6-8.2mdv2008.0.i586.rpm
 c6a98c234a266e8f598261fd083efb66  2008.0/i586/tk-8.5a6-8.2mdv2008.0.i586.rpm 
 5bf712675013ea0217a40b88b250eec6  2008.0/SRPMS/tk-8.5a6-8.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 8600972bc80fe3d7dd4c38996fd3ebaf  2008.0/x86_64/lib64tk-devel-8.5a6-8.2mdv2008.0.x86_64.rpm
 afc55de6e27641bb41ddeff756f5fd7e  2008.0/x86_64/lib64tk8.5-8.5a6-8.2mdv2008.0.x86_64.rpm
 ea6772c14e7ff43edf66c8b11cdb9220  2008.0/x86_64/tk-8.5a6-8.2mdv2008.0.x86_64.rpm 
 5bf712675013ea0217a40b88b250eec6  2008.0/SRPMS/tk-8.5a6-8.2mdv2008.0.src.rpm

 Corporate 3.0:
 3b1d115b2af8da6031f9516258ff6189  corporate/3.0/i586/expect-8.4.5-3.2.C30mdk.i586.rpm
 e7f0b7e434eeb9c0e610b9243a7a77f2  corporate/3.0/i586/itcl-8.4.5-3.2.C30mdk.i586.rpm
 8994456be1907adba99f888605eeb9b0  corporate/3.0/i586/tcl-8.4.5-3.2.C30mdk.i586.rpm
 559e5c236040dd10c97d68029471a2db  corporate/3.0/i586/tcllib-8.4.5-3.2.C30mdk.i586.rpm
 806fee7439ca70c4c3a07b452e235b6e  corporate/3.0/i586/tclx-8.4.5-3.2.C30mdk.i586.rpm
 b43dfda12ad3b87ba08d2fe251f9b789  corporate/3.0/i586/tix-8.4.5-3.2.C30mdk.i586.rpm
 c0def25f6136448cec4b5f76c9ef7768  corporate/3.0/i586/tk-8.4.5-3.2.C30mdk.i586.rpm 
 77bfafd2bc669a44229c98235d9d7ddf  corporate/3.0/SRPMS/tcltk-8.4.5-3.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 087fb2465422f9a986058ea7ef94805f  corporate/3.0/x86_64/expect-8.4.5-3.2.C30mdk.x86_64.rpm
 da7a9ad6f31bf88c450d1a420622eecb  corporate/3.0/x86_64/itcl-8.4.5-3.2.C30mdk.x86_64.rpm
 86e4f3730cb0df460e4046e145e6f23d  corporate/3.0/x86_64/tcl-8.4.5-3.2.C30mdk.x86_64.rpm
 a11c191d79f26ee41f0b3409e7ff9f45  corporate/3.0/x86_64/tcllib-8.4.5-3.2.C30mdk.x86_64.rpm
 c7aacd94b3ffcf5d08b0f849ff11c2fd  corporate/3.0/x86_64/tclx-8.4.5-3.2.C30mdk.x86_64.rpm
 b8d04ce8ef73561878c872ecf648cccc  corporate/3.0/x86_64/tix-8.4.5-3.2.C30mdk.x86_64.rpm
 422837916e450af91a6138cc1b9d293a  corporate/3.0/x86_64/tk-8.4.5-3.2.C30mdk.x86_64.rpm 
 77bfafd2bc669a44229c98235d9d7ddf  corporate/3.0/SRPMS/tcltk-8.4.5-3.2.C30mdk.src.rpm

 Corporate 4.0:
 0a8ab7cee460cd844fc36ffae18f22cf  corporate/4.0/i586/expect-8.4.11-1.2.20060mlcs4.i586.rpm
 d8e97408f980801d3033771bddd3654c  corporate/4.0/i586/itcl-8.4.11-1.2.20060mlcs4.i586.rpm
 b1a73ccba0f46a7368752f61037d55d4  corporate/4.0/i586/iwidgets-8.4.11-1.2.20060mlcs4.i586.rpm
 dbe4336575a216ab49ba2896707d1a42  corporate/4.0/i586/libtcl8.4-8.4.11-1.2.20060mlcs4.i586.rpm
 8eca04215b8688949d00428075bb7e6c  corporate/4.0/i586/libtk8.4-8.4.11-1.2.20060mlcs4.i586.rpm
 a1eaa7f756cdc305b4289eb048f4c27d  corporate/4.0/i586/tcl-8.4.11-1.2.20060mlcs4.i586.rpm
 3efda5e311c63186d677849a53f29588  corporate/4.0/i586/tcllib-8.4.11-1.2.20060mlcs4.i586.rpm
 c6caf3a8451c039d18233e7d0d75ba55  corporate/4.0/i586/tclx-8.4.11-1.2.20060mlcs4.i586.rpm
 8c81d484a98a63edd8aa61db49e328c4  corporate/4.0/i586/tix-8.4.11-1.2.20060mlcs4.i586.rpm
 0fbe1014bcc0e336c99df4ac6c15cede  corporate/4.0/i586/tk-8.4.11-1.2.20060mlcs4.i586.rpm 
 04aeb45e0af9e354bbeb50cf710e92c8  corporate/4.0/SRPMS/tcltk-8.4.11-1.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 a85bcacdbba4e5935d9d0fd362cfe26c  corporate/4.0/x86_64/expect-8.4.11-1.2.20060mlcs4.x86_64.rpm
 853c81ee4ed5ca0d9356b42debdb78a1  corporate/4.0/x86_64/itcl-8.4.11-1.2.20060mlcs4.x86_64.rpm
 4b4e2c34bf7238d2f7d13d558af39c90  corporate/4.0/x86_64/iwidgets-8.4.11-1.2.20060mlcs4.x86_64.rpm
 e7578950e94fb19ffcf498c0f94d8923  corporate/4.0/x86_64/lib64tcl8.4-8.4.11-1.2.20060mlcs4.x86_64.rpm
 15325efd404bf8360a68ff0a9f53d3b7  corporate/4.0/x86_64/lib64tk8.4-8.4.11-1.2.20060mlcs4.x86_64.rpm
 32db571f68c7dfd66ff1424a65ad2f8d  corporate/4.0/x86_64/tcl-8.4.11-1.2.20060mlcs4.x86_64.rpm
 7c93dc23da99af0ccc94ef1f87f2ab19  corporate/4.0/x86_64/tcllib-8.4.11-1.2.20060mlcs4.x86_64.rpm
 85c10ab5dc0e50081897e1798312bb09  corporate/4.0/x86_64/tclx-8.4.11-1.2.20060mlcs4.x86_64.rpm
 83aed2c99f3d77578ff2826dd1ce4926  corporate/4.0/x86_64/tix-8.4.11-1.2.20060mlcs4.x86_64.rpm
 91b1e013f3c8a927cafb96577cc786cc  corporate/4.0/x86_64/tk-8.4.11-1.2.20060mlcs4.x86_64.rpm 
 04aeb45e0af9e354bbeb50cf710e92c8  corporate/4.0/SRPMS/tcltk-8.4.11-1.2.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying
FreeBSD Patches DoS Vulnerability
Rogue cell towers discovered in Washington, D.C.
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.