* SECURITY UPDATE: buffer overflow and potential arbitrary code execution
via crafted GIF image (LP: #191204)
- debian/patches/cve-2008-0553.diff fix from upstream for
generic/tkImgGIF.c to validate initialCodeSize
-
http://tktoolkit.cvs.sourceforge.net/tktoolkit/tk/generic/tkImgGIF.c?r1=1.40&r2=1.41
- CVE-2008-0553
why i must to update when tk8.4 needed of patch ? first patch it and
then send as update
** Changed in: tk8.4 (Ubuntu)
Assignee: (unassigned) => paolodelbene (ninuxpdb)
--
[tk8.3] [tk8.4] [CVE-2008-0553] buffer overflow in the GIF image parsing code
https://bugs.launchpad.net/bugs/191204
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs