Tcl and Tk security update with input validation and buffer overflow flaw
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Oracle linux | Moderate: tcltk security update | 22 Feb 200800:00 | – | oraclelinux |
Oracle linux | Moderate: tk security update | 22 Feb 200800:00 | – | oraclelinux |
Oracle linux | Moderate: tk security update | 21 Feb 200800:00 | – | oraclelinux |
Oracle linux | tcl security and bug fix update | 11 Jan 201300:00 | – | oraclelinux |
OpenVAS | CentOS Update for expect CESA-2008:0134 centos3 i386 | 27 Feb 200900:00 | – | openvas |
OpenVAS | CentOS Update for tcltk CESA-2008:0134-01 centos2 i386 | 27 Feb 200900:00 | – | openvas |
OpenVAS | CentOS Update for expect CESA-2008:0134 centos3 x86_64 | 27 Feb 200900:00 | – | openvas |
OpenVAS | RedHat Update for tcltk RHSA-2008:0134-01 | 6 Mar 200900:00 | – | openvas |
OpenVAS | RedHat Update for tcltk RHSA-2008:0134-01 | 6 Mar 200900:00 | – | openvas |
OpenVAS | CentOS Update for tcltk CESA-2008:0134-01 centos2 i386 | 27 Feb 200900:00 | – | openvas |
Source | Link |
---|---|
steadfast | www.steadfast.net/ |
ict | www.ict.swin.edu.au/staff/jnewbigin |
rhn | www.rhn.redhat.com/errata/rh21as-errata.html |
youtube | www.youtube.com/TheCentOSProject |
www.twitter.com/centos | |
www.linkedin.com/groups/22405 | |
www.facebook.com/groups/centosproject/ | |
www.reddit.com/r/CentOS/ |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | expect | 5.38.0-75 | expect-5.38.0-75.i386.rpm |
CentOS | 2 | i386 | itcl | 3.2-75 | itcl-3.2-75.i386.rpm |
CentOS | 2 | i386 | tcl | 8.3.3-75 | tcl-8.3.3-75.i386.rpm |
CentOS | 2 | i386 | tcllib | 1.0-75 | tcllib-1.0-75.i386.rpm |
CentOS | 2 | i386 | tclx | 8.3-75 | tclx-8.3-75.i386.rpm |
CentOS | 2 | i386 | tix | 8.2.0b1-75 | tix-8.2.0b1-75.i386.rpm |
CentOS | 2 | i386 | tk | 8.3.3-75 | tk-8.3.3-75.i386.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo