Package: libtk-img
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libtk-img.

CVE-2008-0553[0]:
| Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in
| Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary
| code via a crafted GIF image, a similar issue to CVE-2006-4484.

This also affects gif/gif.c in libtk-img and is fixed in 
upstream commit:
http://tkimg.svn.sourceforge.net/viewvc/tkimg/trunk/gif/gif.c?r1=132&r2=135&view=patch&pathrev=135

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553
    http://security-tracker.debian.net/tracker/CVE-2008-0553

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpDps87ZknFJ.pgp
Description: PGP signature

Reply via email to