* SECURITY UPDATE: buffer overflow and potential arbitrary code execution
    via crafted GIF image (LP: #191204)
    - debian/patches/cve-2008-0553.diff fix from upstream for
      generic/tkImgGIF.c to validate initialCodeSize
    - 
http://tktoolkit.cvs.sourceforge.net/tktoolkit/tk/generic/tkImgGIF.c?r1=1.40&r2=1.41
    - CVE-2008-0553


why i must to update when tk8.4 needed of patch ? first patch it and
then send as update

** Changed in: tk8.4 (Ubuntu)
     Assignee: (unassigned) => paolodelbene (ninuxpdb)

-- 
[tk8.3] [tk8.4] [CVE-2008-0553] buffer overflow in the GIF image parsing code
https://bugs.launchpad.net/bugs/191204
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to