Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Pidgin
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Pidgin
ID: DSA-3620-1
Distribution: Debian
Plattformen: Debian sid, Debian jessie, Debian stretch
Datum: Sa, 16. Juli 2016, 00:19
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4323
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2377
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2373
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2368
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2365
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2366
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2369
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2374
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2376
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2367

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3620-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 15, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : pidgin
CVE ID : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323

Yves Younan of Cisco Talos discovered several vulnerabilities in the
MXit protocol support in pidgin, a multi-protocol instant messaging
client. A remote attacker can take advantage of these flaws to cause a
denial of service (application crash), overwrite files, information
disclosure, or potentially to execute arbitrary code.

For the stable distribution (jessie), these problems have been fixed in
version 2.11.0-0+deb8u1.

For the testing distribution (stretch), these problems have been fixed
in version 2.11.0-1.

For the unstable distribution (sid), these problems have been fixed in
version 2.11.0-1.

We recommend that you upgrade your pidgin packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=QNWs
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung