ELSA-2008-0135

ELSA-2008-0135 - Moderate: tk security update

Type:SECURITY
Impact:MODERATE
Release Date:2008-02-22

Description


[8.4.7-3.EL4_6.1]
- CVE-2008-0553 CVE-2007-5378
- GIF overflow and also GIF overflow
Resolves: rhbz #432512


Related CVEs


CVE-2008-0553
CVE-2007-5378

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 4 (i386) tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_i386_latest
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u6_i386_patch
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u7_i386_base
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u8_i386_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_i386_latest
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u6_i386_patch
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u7_i386_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u8_i386_base
tk-devel-8.4.7-3.el4_6.1.i386.rpmcf751b0acffc14097d2a04eb7d32ce62340b2484891d8a76a4407f748efd6093-el4_i386_latest
tk-devel-8.4.7-3.el4_6.1.i386.rpmcf751b0acffc14097d2a04eb7d32ce62340b2484891d8a76a4407f748efd6093-el4_u6_i386_patch
tk-devel-8.4.7-3.el4_6.1.i386.rpmcf751b0acffc14097d2a04eb7d32ce62340b2484891d8a76a4407f748efd6093-el4_u7_i386_base
tk-devel-8.4.7-3.el4_6.1.i386.rpmcf751b0acffc14097d2a04eb7d32ce62340b2484891d8a76a4407f748efd6093-el4_u8_i386_base
Oracle Linux 4 (ia64) tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_ia64_latest
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u6_ia64_patch
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u7_ia64_base
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u8_ia64_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_ia64_latest
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u6_ia64_patch
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u7_ia64_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u8_ia64_base
tk-8.4.7-3.el4_6.1.ia64.rpm94f0accd8cd8230e931b98ae5eae1ce84d688a36e69bc7dd0a2145018f990a2f-el4_ia64_latest
tk-8.4.7-3.el4_6.1.ia64.rpm94f0accd8cd8230e931b98ae5eae1ce84d688a36e69bc7dd0a2145018f990a2f-el4_u6_ia64_patch
tk-8.4.7-3.el4_6.1.ia64.rpm94f0accd8cd8230e931b98ae5eae1ce84d688a36e69bc7dd0a2145018f990a2f-el4_u7_ia64_base
tk-8.4.7-3.el4_6.1.ia64.rpm94f0accd8cd8230e931b98ae5eae1ce84d688a36e69bc7dd0a2145018f990a2f-el4_u8_ia64_base
tk-devel-8.4.7-3.el4_6.1.ia64.rpmdc4f66e54728158666b7c0d798746100247b80cf549813fb778f9083008ff506-el4_ia64_latest
tk-devel-8.4.7-3.el4_6.1.ia64.rpmdc4f66e54728158666b7c0d798746100247b80cf549813fb778f9083008ff506-el4_u6_ia64_patch
tk-devel-8.4.7-3.el4_6.1.ia64.rpmdc4f66e54728158666b7c0d798746100247b80cf549813fb778f9083008ff506-el4_u7_ia64_base
tk-devel-8.4.7-3.el4_6.1.ia64.rpmdc4f66e54728158666b7c0d798746100247b80cf549813fb778f9083008ff506-el4_u8_ia64_base
Oracle Linux 4 (x86_64) tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u6_x86_64_patch
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u7_x86_64_base
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_u8_x86_64_base
tk-8.4.7-3.el4_6.1.src.rpm3729c0c41e22e0d78a6aaec593d3b05acba264f7ae979b91797d95b52909f22d-el4_x86_64_latest
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u6_x86_64_patch
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u7_x86_64_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_u8_x86_64_base
tk-8.4.7-3.el4_6.1.i386.rpm3b856272070d38445b63974f040dca24b6f7c2a50a3420b8e5deff53cdd089c5-el4_x86_64_latest
tk-8.4.7-3.el4_6.1.x86_64.rpmb3fd22e21f4e437cd48ecc5dda6f6a3c6a933423cd1578d42143d253c096e751-el4_u6_x86_64_patch
tk-8.4.7-3.el4_6.1.x86_64.rpmb3fd22e21f4e437cd48ecc5dda6f6a3c6a933423cd1578d42143d253c096e751-el4_u7_x86_64_base
tk-8.4.7-3.el4_6.1.x86_64.rpmb3fd22e21f4e437cd48ecc5dda6f6a3c6a933423cd1578d42143d253c096e751-el4_u8_x86_64_base
tk-8.4.7-3.el4_6.1.x86_64.rpmb3fd22e21f4e437cd48ecc5dda6f6a3c6a933423cd1578d42143d253c096e751-el4_x86_64_latest
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm742b78dde65371e3fbb0353341b8b769a695176e3fc62730478655db652114b3-el4_u6_x86_64_patch
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm742b78dde65371e3fbb0353341b8b769a695176e3fc62730478655db652114b3-el4_u7_x86_64_base
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm742b78dde65371e3fbb0353341b8b769a695176e3fc62730478655db652114b3-el4_u8_x86_64_base
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm742b78dde65371e3fbb0353341b8b769a695176e3fc62730478655db652114b3-el4_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete