Secunia Security Advisory - Debian has issued an update for libtk-img. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.
d0f5a7ea9d8a593398d0bcc036e3d02e92099bd16832a4f5acd6828e52bb1d07
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
International Partner Manager - Project Sales in the IT-Security
Industry:
http://corporate.secunia.com/about_secunia/64/
----------------------------------------------------------------------
TITLE:
Debian update for libtk-img
SECUNIA ADVISORY ID:
SA30783
VERIFY ADVISORY:
http://secunia.com/advisories/30783/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux unstable alias sid
http://secunia.com/product/530/
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
DESCRIPTION:
Debian has issued an update for libtk-img. This fixes a
vulnerability, which can be exploited by malicious people to
compromise an application using the library.
For more information:
SA28784
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2.dsc
Size/MD5 checksum: 955 899003c10c63f4045b6df8ef32d3fafe
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3.orig.tar.gz
Size/MD5 checksum: 3918119 ee19a7fdaaa64e9d85eeecd3b78bce8f
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2.diff.gz
Size/MD5 checksum: 242795 deb7118d93d3657201e4892c0e62e1d2
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_amd64.deb
Size/MD5 checksum: 461706 7394a577a99522bdabcf6016dcc05de7
arm architecture (ARM)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_arm.deb
Size/MD5 checksum: 435110 96a6c430a51de8914023256029ebac06
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_hppa.deb
Size/MD5 checksum: 488468 78173de530e68252090369658db6dab7
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_i386.deb
Size/MD5 checksum: 431784 902eaac4fba63bccf7be864ff1242aa0
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_ia64.deb
Size/MD5 checksum: 601570 4c004fd7d945b8f3e4591b5bf27ce0a8
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_mips.deb
Size/MD5 checksum: 445292 33639ca7ed46125b98e503c2b82e34e8
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_mipsel.deb
Size/MD5 checksum: 440938 20d279c06711eb509f42d48ac697ba9f
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_powerpc.deb
Size/MD5 checksum: 452162 8e87166cc45ccbf4c0a38ee36993f472
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_s390.deb
Size/MD5 checksum: 457402 2857259815207722d226c8fd90e78923
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_sparc.deb
Size/MD5 checksum: 421954 686340dad232ce09f661569e37387b4d
-- Debian GNU/Linux unstable alias sid --
Fixed in version 1:1.3-release-7.
ORIGINAL ADVISORY:
http://lists.debian.org/debian-security-announce/2008/msg00179.html
OTHER REFERENCES:
SA28784:
http://secunia.com/advisories/28784/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------