Security Advisories (4)
Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first. NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
- http://sourceforge.net/project/shownotes.php?release_id=541207
- http://secunia.com/advisories/26942
- http://bugs.gentoo.org/show_bug.cgi?id=192539
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00261.html
- http://security.gentoo.org/glsa/glsa-200710-07.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:200
- http://www.novell.com/linux/security/advisories/2007_20_sr.html
- http://www.ubuntu.com/usn/usn-529-1
- http://www.attrition.org/pipermail/vim/2007-October/001826.html
- http://www.securityfocus.com/bid/25826
- http://secunia.com/advisories/27086
- http://secunia.com/advisories/27207
- http://secunia.com/advisories/27182
- http://secunia.com/advisories/27295
- http://secunia.com/advisories/27229
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://secunia.com/advisories/29069
- http://www.debian.org/security/2009/dsa-1743
- http://secunia.com/advisories/34297
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9540
Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
- http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894
- http://www.securityfocus.com/bid/27655
- http://securitytracker.com/id?1019309
- http://secunia.com/advisories/28784
- https://bugzilla.redhat.com/show_bug.cgi?id=431518
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00193.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00132.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00115.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00205.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:041
- http://secunia.com/advisories/28807
- http://secunia.com/advisories/28848
- http://www.debian.org/security/2008/dsa-1490
- http://www.debian.org/security/2008/dsa-1491
- http://secunia.com/advisories/28857
- http://secunia.com/advisories/28867
- http://wiki.rpath.com/Advisories:rPSA-2008-0054
- https://issues.rpath.com/browse/RPL-2215
- http://secunia.com/advisories/28954
- http://www.redhat.com/support/errata/RHSA-2008-0135.html
- http://www.redhat.com/support/errata/RHSA-2008-0134.html
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://secunia.com/advisories/29069
- http://secunia.com/advisories/29070
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
- http://secunia.com/advisories/29622
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1
- http://secunia.com/advisories/30129
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://secunia.com/advisories/30535
- http://secunia.com/advisories/30717
- http://secunia.com/advisories/30783
- http://www.novell.com/linux/security/advisories/2008_13_sr.html
- http://www.debian.org/security/2008/dsa-1598
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00116.html
- http://secunia.com/advisories/30188
- http://www.vupen.com/english/advisories/2008/0430
- http://www.vupen.com/english/advisories/2008/1744
- http://www.vupen.com/english/advisories/2008/1456/references
- http://ubuntu.com/usn/usn-664-1
- http://secunia.com/advisories/32608
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10098
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
- http://www.securityfocus.com/archive/1/488069/100/0/threaded
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://www.postgresql.org/about/news.905
- http://www.securityfocus.com/bid/27163
- http://securitytracker.com/id?1019157
- http://secunia.com/advisories/28359
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- https://issues.rpath.com/browse/RPL-1768
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28455
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://secunia.com/advisories/28679
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://secunia.com/advisories/28698
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://www.redhat.com/support/errata/RHSA-2008-0134.html
- http://secunia.com/advisories/29070
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:059
- http://secunia.com/advisories/29248
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://secunia.com/advisories/29638
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://secunia.com/advisories/30535
- http://www.vupen.com/english/advisories/2008/1071/references
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/1744
- http://www.vupen.com/english/advisories/2008/0061
- http://rhn.redhat.com/errata/RHSA-2013-0122.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39497
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11569
- https://usn.ubuntu.com/568-1/
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://www.postgresql.org/about/news.905
- http://www.securityfocus.com/bid/27163
- http://securitytracker.com/id?1019157
- http://secunia.com/advisories/28359
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- https://issues.rpath.com/browse/RPL-1768
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28455
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://secunia.com/advisories/28679
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://secunia.com/advisories/28698
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://secunia.com/advisories/29638
- http://www.vupen.com/english/advisories/2008/1071/references
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/0061
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://rhn.redhat.com/errata/RHSA-2013-0122.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39498
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10235
- https://usn.ubuntu.com/568-1/
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
Modules
Module Install Instructions
To install Tcl, copy and paste the appropriate command in to your terminal.
cpanm Tcl
perl -MCPAN -e shell
install Tcl
For more information on module installation, please visit the detailed CPAN module installation guide.