| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0058: pidgin-2.10.7-1.1.mga2 (2/core) |
| Date: |
| Thu, 21 Feb 2013 21:55:13 +0100 |
| Message-ID: |
| <20130221205513.GA30284@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0058
Date: February 21st, 2013
Affected releases: 2
Media: Core
Description:
Updated pidgin packages fix security vulnerabilities:
Remote MXit user could specify local file path in Pidgin before 2.10.7.
The MXit protocol plugin saves an image to local disk using a filename
that could potentially be partially specified by the IM server or by a
remote user (CVE-2013-0271).
MXit buffer overflow reading data from network in Pidgin before 2.10.7.
The code did not respect the size of the buffer when parsing HTTP
headers, and a malicious server or man-in-the-middle could send
specially crafted data that could overflow the buffer. This could
lead to a crash or remote code execution (CVE-2013-0272).
Sametime crash with long user IDs in Pidgin before 2.10.7. libpurple
failed to null-terminate user IDs that were longer than 4096 bytes.
It's plausible that a malicious server could send one of these to us,
which would lead to a crash (CVE-2013-0273).
Crash when receiving a UPnP response with abnormally long values in
Pidgin before 2.10.7. libpurple failed to null-terminate some strings
when parsing the response from a UPnP router. This could lead to a
crash if a malicious user on your network responds with a specially
crafted message (CVE-2013-0274).
Pidgin has been updated to 2.10.7, which fixes these and other issues.
Updated Packages:
i586:
finch-2.10.7-1.1.mga2.i586.rpm
libfinch0-2.10.7-1.1.mga2.i586.rpm
libpurple0-2.10.7-1.1.mga2.i586.rpm
libpurple-devel-2.10.7-1.1.mga2.i586.rpm
pidgin-2.10.7-1.1.mga2.i586.rpm
pidgin-bonjour-2.10.7-1.1.mga2.i586.rpm
pidgin-client-2.10.7-1.1.mga2.i586.rpm
pidgin-i18n-2.10.7-1.1.mga2.noarch.rpm
pidgin-meanwhile-2.10.7-1.1.mga2.i586.rpm
pidgin-perl-2.10.7-1.1.mga2.i586.rpm
pidgin-plugins-2.10.7-1.1.mga2.i586.rpm
pidgin-silc-2.10.7-1.1.mga2.i586.rpm
pidgin-tcl-2.10.7-1.1.mga2.i586.rpm
pidgin-debug-2.10.7-1.1.mga2.i586.rpm
x86_64:
finch-2.10.7-1.1.mga2.x86_64.rpm
lib64finch0-2.10.7-1.1.mga2.x86_64.rpm
lib64purple0-2.10.7-1.1.mga2.x86_64.rpm
lib64purple-devel-2.10.7-1.1.mga2.x86_64.rpm
pidgin-2.10.7-1.1.mga2.x86_64.rpm
pidgin-bonjour-2.10.7-1.1.mga2.x86_64.rpm
pidgin-client-2.10.7-1.1.mga2.x86_64.rpm
pidgin-i18n-2.10.7-1.1.mga2.noarch.rpm
pidgin-meanwhile-2.10.7-1.1.mga2.x86_64.rpm
pidgin-perl-2.10.7-1.1.mga2.x86_64.rpm
pidgin-plugins-2.10.7-1.1.mga2.x86_64.rpm
pidgin-silc-2.10.7-1.1.mga2.x86_64.rpm
pidgin-tcl-2.10.7-1.1.mga2.x86_64.rpm
pidgin-debug-2.10.7-1.1.mga2.x86_64.rpm
SRPMS:
pidgin-2.10.7-1.1.mga2.src.rpm
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
http://pidgin.im/news/security/?id=65
http://pidgin.im/news/security/?id=66
http://pidgin.im/news/security/?id=67
http://pidgin.im/news/security/?id=68
https://developer.pidgin.im/wiki/ChangeLog
https://bugs.mageia.org/show_bug.cgi?id=9064
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...
(
Log in to post comments)