|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for tcl RHSA-2013:0122-01|
|Summary:||The remote host is missing an update for the 'tcl'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'tcl'
package(s) announced via the referenced advisory.
Tcl (Tool Command Language) provides a powerful platform for creating
integration applications that tie together diverse applications, protocols,
devices, and frameworks. When paired with the Tk toolkit, Tcl provides a
fast and powerful way to create cross-platform GUI applications.
Two denial of service flaws were found in the Tcl regular expression
handling engine. If Tcl or an application using Tcl processed a
specially-crafted regular expression, it would lead to excessive CPU and
memory consumption. (CVE-2007-4772, CVE-2007-6067)
This update also fixes the following bug:
* Due to a suboptimal implementation of threading in the current version of
the Tcl language interpreter, an attempt to use threads in combination with
fork in a Tcl script could cause the script to stop responding. At the
moment, it is not possible to rewrite the source code or drop support for
threading entirely. Consequent to this, this update provides a version of
Tcl without threading support in addition to the standard version with this
support. Users who need to use fork in their Tcl scripts and do not require
threading can now switch to the version without threading support by using
the alternatives command. (BZ#478961)
All users of Tcl are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
tcl on Red Hat Enterprise Linux (v. 5 server)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2007-4772|
BugTraq ID: 27163
Bugtraq: 20080107 PostgreSQL 2007-01-07 Cumulative Security Release (Google Search)
Bugtraq: 20080115 rPSA-2008-0016-1 postgresql postgresql-server (Google Search)
Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search)
Debian Security Information: DSA-1460 (Google Search)
Debian Security Information: DSA-1463 (Google Search)
HPdes Security Advisory: HPSBTU02325
HPdes Security Advisory: SSRT080006
RedHat Security Advisories: RHSA-2013:0122
SuSE Security Announcement: SUSE-SA:2008:005 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0539 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0555 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:0677 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0531 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:0578 (Google Search)
XForce ISS Database: postgresql-regular-expression-dos(39497)
Common Vulnerability Exposure (CVE) ID: CVE-2007-6067
XForce ISS Database: postgresql-complex-expression-dos(39498)
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.