* SECURITY UPDATE: buffer overflow and potential arbitrary code execution via crafted GIF image (LP: #191204) - debian/patches/cve-2008-0553.diff fix from upstream for generic/tkImgGIF.c to validate initialCodeSize - http://tktoolkit.cvs.sourceforge.net/tktoolkit/tk/generic/tkImgGIF.c?r1=1.40&r2=1.41 - CVE-2008-0553
why i must to update when tk8.4 needed of patch ? first patch it and then send as update ** Changed in: tk8.4 (Ubuntu) Assignee: (unassigned) => paolodelbene (ninuxpdb) -- [tk8.3] [tk8.4] [CVE-2008-0553] buffer overflow in the GIF image parsing code https://bugs.launchpad.net/bugs/191204 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs