---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Debian update for libtk-img SECUNIA ADVISORY ID: SA30783 VERIFY ADVISORY: http://secunia.com/advisories/30783/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for libtk-img. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. For more information: SA28784 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2.dsc Size/MD5 checksum: 955 899003c10c63f4045b6df8ef32d3fafe http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3.orig.tar.gz Size/MD5 checksum: 3918119 ee19a7fdaaa64e9d85eeecd3b78bce8f http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2.diff.gz Size/MD5 checksum: 242795 deb7118d93d3657201e4892c0e62e1d2 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_amd64.deb Size/MD5 checksum: 461706 7394a577a99522bdabcf6016dcc05de7 arm architecture (ARM) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_arm.deb Size/MD5 checksum: 435110 96a6c430a51de8914023256029ebac06 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_hppa.deb Size/MD5 checksum: 488468 78173de530e68252090369658db6dab7 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_i386.deb Size/MD5 checksum: 431784 902eaac4fba63bccf7be864ff1242aa0 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_ia64.deb Size/MD5 checksum: 601570 4c004fd7d945b8f3e4591b5bf27ce0a8 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_mips.deb Size/MD5 checksum: 445292 33639ca7ed46125b98e503c2b82e34e8 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_mipsel.deb Size/MD5 checksum: 440938 20d279c06711eb509f42d48ac697ba9f powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_powerpc.deb Size/MD5 checksum: 452162 8e87166cc45ccbf4c0a38ee36993f472 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_s390.deb Size/MD5 checksum: 457402 2857259815207722d226c8fd90e78923 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch2_sparc.deb Size/MD5 checksum: 421954 686340dad232ce09f661569e37387b4d -- Debian GNU/Linux unstable alias sid -- Fixed in version 1:1.3-release-7. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00179.html OTHER REFERENCES: SA28784: http://secunia.com/advisories/28784/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------