Buffer overflow in Tk8.3 GIF image parsing code fixed in versions 8.3.5-6etch2 and 8.3.5-4sarge1
Reporter | Title | Published | Views | Family All 127 |
---|---|---|---|---|
OpenVAS | Fedora Update for perl-Tk FEDORA-2008-1323 | 16 Feb 200900:00 | – | openvas |
OpenVAS | SLES10: Security update for Tk | 13 Oct 200900:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-1491-1) | 15 Feb 200800:00 | – | openvas |
OpenVAS | SLES9: Security update for Tk | 10 Oct 200900:00 | – | openvas |
OpenVAS | Fedora Update for tkimg FEDORA-2008-3621 | 17 Feb 200900:00 | – | openvas |
OpenVAS | Fedora Update for tkimg FEDORA-2008-3621 | 17 Feb 200900:00 | – | openvas |
OpenVAS | Fedora Update for perl-Tk FEDORA-2008-1384 | 16 Feb 200900:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-1598-1) | 27 Jun 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 1598-1 (libtk-img) | 28 Jun 200800:00 | – | openvas |
OpenVAS | SLES10: Security update for Tk | 13 Oct 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 4 | hppa | tk8.3 | 8.3.5-6etch2 | tk8.3_8.3.5-6etch2_hppa.deb |
Debian | 3.1 | m68k | tk8.3 | 8.3.5-4sarge1 | tk8.3_8.3.5-4sarge1_m68k.deb |
Debian | 3.1 | sparc | tk8.3-dev | 8.3.5-4sarge1 | tk8.3-dev_8.3.5-4sarge1_sparc.deb |
Debian | 5 | sparc | libtk-img-dev | 1:1.3-release-6+lenny1 | libtk-img-dev_1:1.3-release-6+lenny1_sparc.deb |
Debian | 4 | alpha | tk8.3-dev | 8.3.5-6etch2 | tk8.3-dev_8.3.5-6etch2_alpha.deb |
Debian | 4 | arm | tk8.4 | 8.4.12-1etch2 | tk8.4_8.4.12-1etch2_arm.deb |
Debian | 3.1 | s390 | tk8.4-dev | 8.4.9-1sarge2 | tk8.4-dev_8.4.9-1sarge2_s390.deb |
Debian | 4 | amd64 | tk8.3-dev | 8.3.5-6etch2 | tk8.3-dev_8.3.5-6etch2_amd64.deb |
Debian | 3.1 | s390 | tk8.3-dev | 8.3.5-4sarge1 | tk8.3-dev_8.3.5-4sarge1_s390.deb |
Debian | 4 | s390 | libtk-img | 1:1.3-15etch2 | libtk-img_1:1.3-15etch2_s390.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo