Skip to navigation

Security Advisory Moderate: tk security update

Advisory: RHSA-2008:0135-2
Type: Security Advisory
Severity: Moderate
Issued on: 2008-02-21
Last updated on: 2008-02-22
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.6.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.6.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-5378
CVE-2008-0553

Details

Updated tk packages that fix a security issue are now available for Red Hat
Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

[Updated 22 February 2008]
The packages in this errata were originally pushed to the wrong Red Hat
Network channels and were not available to all users. We have updated this
errata with the correct channels.

Tk is a graphical toolkit for the Tcl scripting language.

An input validation flaw was discovered in Tk's GIF image handling. A
code-size value read from a GIF image was not properly validated before
being used, leading to a buffer overflow. A specially crafted GIF file
could use this to cause a crash or, potentially, execute code with the
privileges of the application using the Tk graphical toolkit.
(CVE-2008-0553)

A buffer overflow flaw was discovered in Tk's animated GIF image handling.
An animated GIF containing an initial image smaller than subsequent images
could cause a crash or, potentially, execute code with the privileges of
the application using the Tk library. (CVE-2007-5378)

All users are advised to upgrade to these updated packages which contain a
backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
IA-64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.ia64.rpm     MD5: f8a7819691ee3f7053d7750039f3e1a8
tk-devel-8.4.7-3.el4_6.1.ia64.rpm     MD5: b4ed37b7ad38684803c30a4cb572a98b
 
PPC:
tk-8.4.7-3.el4_6.1.ppc.rpm     MD5: c4d7406405cc875dc7d6cdc087877265
tk-8.4.7-3.el4_6.1.ppc64.rpm     MD5: 6093f43d9c26673f0453015edb93ef46
tk-devel-8.4.7-3.el4_6.1.ppc.rpm     MD5: 293c00ccc35175a26d710938b8f46f3c
 
s390:
tk-8.4.7-3.el4_6.1.s390.rpm     MD5: ed8624fa464081ea1b625cceaf002f5a
tk-devel-8.4.7-3.el4_6.1.s390.rpm     MD5: 7cc110fa1a3d7874daf4a19c8281613a
 
s390x:
tk-8.4.7-3.el4_6.1.s390.rpm     MD5: ed8624fa464081ea1b625cceaf002f5a
tk-8.4.7-3.el4_6.1.s390x.rpm     MD5: c27905fba09b2627c8fab35700fcaf22
tk-devel-8.4.7-3.el4_6.1.s390x.rpm     MD5: 4268b8a2cb3c194f2a04676689ba366d
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
Red Hat Enterprise Linux AS (v. 4.6.z)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
IA-64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.ia64.rpm     MD5: f8a7819691ee3f7053d7750039f3e1a8
tk-devel-8.4.7-3.el4_6.1.ia64.rpm     MD5: b4ed37b7ad38684803c30a4cb572a98b
 
PPC:
tk-8.4.7-3.el4_6.1.ppc.rpm     MD5: c4d7406405cc875dc7d6cdc087877265
tk-8.4.7-3.el4_6.1.ppc64.rpm     MD5: 6093f43d9c26673f0453015edb93ef46
tk-devel-8.4.7-3.el4_6.1.ppc.rpm     MD5: 293c00ccc35175a26d710938b8f46f3c
 
s390:
tk-8.4.7-3.el4_6.1.s390.rpm     MD5: ed8624fa464081ea1b625cceaf002f5a
tk-devel-8.4.7-3.el4_6.1.s390.rpm     MD5: 7cc110fa1a3d7874daf4a19c8281613a
 
s390x:
tk-8.4.7-3.el4_6.1.s390.rpm     MD5: ed8624fa464081ea1b625cceaf002f5a
tk-8.4.7-3.el4_6.1.s390x.rpm     MD5: c27905fba09b2627c8fab35700fcaf22
tk-devel-8.4.7-3.el4_6.1.s390x.rpm     MD5: 4268b8a2cb3c194f2a04676689ba366d
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
IA-64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.ia64.rpm     MD5: f8a7819691ee3f7053d7750039f3e1a8
tk-devel-8.4.7-3.el4_6.1.ia64.rpm     MD5: b4ed37b7ad38684803c30a4cb572a98b
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
Red Hat Enterprise Linux ES (v. 4.6.z)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
IA-64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.ia64.rpm     MD5: f8a7819691ee3f7053d7750039f3e1a8
tk-devel-8.4.7-3.el4_6.1.ia64.rpm     MD5: b4ed37b7ad38684803c30a4cb572a98b
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
tk-8.4.7-3.el4_6.1.src.rpm     MD5: 4781080278dd2ad29ecd3c40f8eeca9c
 
IA-32:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-devel-8.4.7-3.el4_6.1.i386.rpm     MD5: aaa9db9c3a86c1312b5cc4d83bcd9da0
 
IA-64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.ia64.rpm     MD5: f8a7819691ee3f7053d7750039f3e1a8
tk-devel-8.4.7-3.el4_6.1.ia64.rpm     MD5: b4ed37b7ad38684803c30a4cb572a98b
 
x86_64:
tk-8.4.7-3.el4_6.1.i386.rpm     MD5: 06267d42a3b0e115cbedd3963cb7c51c
tk-8.4.7-3.el4_6.1.x86_64.rpm     MD5: ad7748f1aa63684e895329a8f00da25f
tk-devel-8.4.7-3.el4_6.1.x86_64.rpm     MD5: 724cb04896b527d7efe3eb92b5bd5f14
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

332021 - CVE-2007-5378 Tk GIF processing buffer overflow
431518 - CVE-2008-0553 tk: GIF handling buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/