---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Debian update for libtk-img SECUNIA ADVISORY ID: SA34297 VERIFY ADVISORY: http://secunia.com/advisories/34297/ DESCRIPTION: Debian has issued an update for libtk-img. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library. For more information: SA26942 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3.diff.gz Size/MD5 checksum: 245234 735f4c10ef82cb9d871351b180ae47dc http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3.orig.tar.gz Size/MD5 checksum: 3918119 ee19a7fdaaa64e9d85eeecd3b78bce8f http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3.dsc Size/MD5 checksum: 663 3a273d841105b8978f96eca6533eeefd alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_alpha.deb Size/MD5 checksum: 491110 07e4cdac4f3fba01a3b7d84648c6809d amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_amd64.deb Size/MD5 checksum: 461822 cae988f3575b2087b7d04eea38a25440 arm architecture (ARM) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_arm.deb Size/MD5 checksum: 436356 7ef635df0204508e8e883eb4a54ae58f i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_i386.deb Size/MD5 checksum: 430104 b00a0cb661ea599ce296796547520fe0 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_ia64.deb Size/MD5 checksum: 601608 49309def501db030330443b5bb955d38 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_mips.deb Size/MD5 checksum: 441054 026d2c2af3bed4b7f3452a7bddfaaee3 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_mipsel.deb Size/MD5 checksum: 441044 24d9bc504e550643afd51fe1f3fff1e1 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_powerpc.deb Size/MD5 checksum: 452226 3769f2ee4ac052602db18ad14e5a33d0 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_s390.deb Size/MD5 checksum: 457496 870628476aec308c566d3f4bea697730 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-15etch3_sparc.deb Size/MD5 checksum: 424242 5ff1ceda5f92c0ce34398ad1a375b3ce -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1.diff.gz Size/MD5 checksum: 31608 9aa3a3da9d17f06545411973eb66cf81 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release.orig.tar.gz Size/MD5 checksum: 3969630 964a692db8a120dc5ed8779521a70bc8 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1.dsc Size/MD5 checksum: 1207 83e0a72a0c54c38a38f1acc6006dd881 Architecture independent packages: http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-doc_1.3-release-7+lenny1_all.deb Size/MD5 checksum: 89232 963cfc7f3b480f65d23da12086099bdb alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_alpha.deb Size/MD5 checksum: 147218 3818c8a511e96717a159608ecffdcc90 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_alpha.deb Size/MD5 checksum: 59322 fc4813740e77630bb9c69cf3f4636342 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_amd64.deb Size/MD5 checksum: 136130 2807ef2c010419b0daa1a10bbcf26cfa http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_amd64.deb Size/MD5 checksum: 61522 b32861939b7bb9e5cb7dd0a0468e46f2 arm architecture (ARM) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_arm.deb Size/MD5 checksum: 129814 ab2b0b3b5ae507ef3aa0f8ad218513a7 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_arm.deb Size/MD5 checksum: 59210 0a1b9b43cef09ddc4613e5ca1afb9435 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_i386.deb Size/MD5 checksum: 119526 a7ab424a2a7ad7ec5b2a58097b96b206 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_i386.deb Size/MD5 checksum: 58924 3a65c23ecc11b3e581cb64d26912daab ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_ia64.deb Size/MD5 checksum: 59430 e54e0eb23f40d0d197db99d0dd04e651 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_ia64.deb Size/MD5 checksum: 186630 ebcca2c511bf43f1ef3b12e3adaae97d mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_mips.deb Size/MD5 checksum: 59338 fde2040f51b9bdb782382bb6bb21e74b http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_mips.deb Size/MD5 checksum: 128314 fa953d1ad555ba495f4e58ca824d83bc mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_mipsel.deb Size/MD5 checksum: 59340 9f570ecd96eba5b0c672113e7433c204 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_mipsel.deb Size/MD5 checksum: 128246 547d8c58d76735d00d93701028d05de7 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_powerpc.deb Size/MD5 checksum: 59248 95180c3c45dfbdc4dc4356253f915441 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_powerpc.deb Size/MD5 checksum: 156072 36b72aa56e99d26cfc773f2f5c916970 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_s390.deb Size/MD5 checksum: 131008 f4401f63947dd3a80f64c4b9abd80924 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_s390.deb Size/MD5 checksum: 59280 b0784e2a4579dff140ed9c65a7e75997 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img-dev_1.3-release-7+lenny1_sparc.deb Size/MD5 checksum: 59192 947382bad7ce91d54a477d59a3cd94d4 http://security.debian.org/pool/updates/main/libt/libtk-img/libtk-img_1.3-release-7+lenny1_sparc.deb Size/MD5 checksum: 121050 000240ceaa3638b39b3ee71bcee37406 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.3-release-8. ORIGINAL ADVISORY: DSA-1743-1: http://lists.debian.org/debian-security-announce/2009/msg00053.html OTHER REFERENCES: SA26942: http://secunia.com/advisories/26942/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------