This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0601363562021518599== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0 Content-Type: multipart/mixed; boundary="QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <578524EE.7020304@canonical.com> Subject: [USN-3031-1] Pidgin vulnerabilities
--QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3031-1 July 12, 2016
pidgin vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Pidgin could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - pidgin: graphical multi-protocol instant messaging client for X
Details:
Yves Younan discovered that Pidgin contained multiple issues in the MXit protocol support. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: libpurple0 1:2.10.11-0ubuntu4.2
Ubuntu 14.04 LTS: libpurple0 1:2.10.9-0ubuntu3.3
Ubuntu 12.04 LTS: libpurple0 1:2.10.3-0ubuntu1.7
After a standard system update you need to restart Pidgin to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3031-1 CVE-2016-2365, CVE-2016-2366, CVE-2016-2367, CVE-2016-2368, CVE-2016-2369, CVE-2016-2370, CVE-2016-2371, CVE-2016-2372, CVE-2016-2373, CVE-2016-2374, CVE-2016-2375, CVE-2016-2376, CVE-2016-2377, CVE-2016-2378, CVE-2016-2380, CVE-2016-4323
Package Information: https://launchpad.net/ubuntu/+source/pidgin/1:2.10.11-0ubuntu4.2 https://launchpad.net/ubuntu/+source/pidgin/1:2.10.9-0ubuntu3.3 https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.7
--QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx--
--0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJXhSTuAAoJEGVp2FWnRL6TYsEP/1d6aHxAhbaW3JFXdjTmBw5t xMfx7lNXtcdDjjQusoALXdD+97LC/qVW82kUBk/5hqp7lxUPv7A9Ixd4C4MR3g3l 1WhHZksqxLVH+AeyLHcxeos/KFRBi+mUWaxkUIkh5ovN0bJ6XjZpCuAWEY8boWB1 sbHSWrToqfJ/bsXOERA1Kj0x8TxKlV7vUYDMZQj2trIUOzvpOIwhe69gDkMga7iI OITInsqEUWLQsgr7NZHgWvZAUHghSCJoBf7JO2bfpw8I3SyL12k1rT6SDDf96QDo hCqXclBDe1ktQu16UoNhbdPotKuIXkTtud/51F4oLSuuPlfgeGujT/MxLfIEAIXQ Skm0WsBPKhOcxvOZSmKHxzkO5ogLj0ZqChOlLyVAwIdfXs1nRfMtAZcHllfcjEIe xizH4rdFmAjdZLjGPynW1lWj65AmZI1w/vh6E9cTim7ypdjiKCIucKl6tbZjCtqY 7b/0hygJfO66tsbzox4aUXkozWiqw4U3OFCL6gCLAhM4sM4Zk/CAQqlG1kYV+tXb i6s0FRoUT6HjYWfPdCjcMMV9kNl5sfShyu1YtKPMMIq8FZZCuMX4j8EI+Z1/9WL7 QMTY6l8DyoLblrI01fjtKJFMjoJK1BmHnys8tCWlOLU1y9gedId3TuLTVyK5OzpS SPPPEf0P0O2nHt20P+hU =5mE2 -----END PGP SIGNATURE-----
--0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0--
--===============0601363562021518599== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0601363562021518599==--
|