Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for tcl RHSA-2013:0122-01
Summary:The remote host is missing an update for the 'tcl'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'tcl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Tcl (Tool Command Language) provides a powerful platform for creating
integration applications that tie together diverse applications, protocols,
devices, and frameworks. When paired with the Tk toolkit, Tcl provides a
fast and powerful way to create cross-platform GUI applications.

Two denial of service flaws were found in the Tcl regular expression
handling engine. If Tcl or an application using Tcl processed a
specially-crafted regular expression, it would lead to excessive CPU and
memory consumption. (CVE-2007-4772, CVE-2007-6067)

This update also fixes the following bug:

* Due to a suboptimal implementation of threading in the current version of
the Tcl language interpreter, an attempt to use threads in combination with
fork in a Tcl script could cause the script to stop responding. At the
moment, it is not possible to rewrite the source code or drop support for
threading entirely. Consequent to this, this update provides a version of
Tcl without threading support in addition to the standard version with this
support. Users who need to use fork in their Tcl scripts and do not require
threading can now switch to the version without threading support by using
the alternatives command. (BZ#478961)

All users of Tcl are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.

Affected Software/OS:
tcl on Red Hat Enterprise Linux (v. 5 server)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4772
BugTraq ID: 27163
Bugtraq: 20080107 PostgreSQL 2007-01-07 Cumulative Security Release (Google Search)
Bugtraq: 20080115 rPSA-2008-0016-1 postgresql postgresql-server (Google Search)
Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search)
Debian Security Information: DSA-1460 (Google Search)
Debian Security Information: DSA-1463 (Google Search)
HPdes Security Advisory: HPSBTU02325
HPdes Security Advisory: SSRT080006
RedHat Security Advisories: RHSA-2013:0122
SuSE Security Announcement: SUSE-SA:2008:005 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0539 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0555 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0677 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0531 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0578 (Google Search)
XForce ISS Database: postgresql-regular-expression-dos(39497)
Common Vulnerability Exposure (CVE) ID: CVE-2007-6067
XForce ISS Database: postgresql-complex-expression-dos(39498)
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.