Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Pidgin
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Pidgin
ID: FEDORA-2014-1999
Distribution: Fedora
Plattformen: Fedora 19
Datum: So, 16. Februar 2014, 09:44
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
Applikationen: Pidgin

Originalnachricht

Name        : pidgin
Product : Fedora 19
Version : 2.10.9
Release : 1.fc19
URL : http://pidgin.im/
Summary : A Gtk+ based multiprotocol instant messaging client
Description :
Pidgin allows you to talk to anyone using a variety of messaging
protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu,
ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and
Zephyr. These protocols are implemented using a modular, easy to
use design. To use a protocol, just add an account using the
account editor.

Pidgin supports many common features of other clients, as well as many
unique features, such as perl scripting, TCL scripting and C plugins.

Pidgin is not affiliated with or endorsed by America Online, Inc.,
Microsoft Corporation, Yahoo! Inc., or ICQ Inc.

-------------------------------------------------------------------------------
-
Update Information:

Update to 2.10.9
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 3 2014 Dan Mashal <dan.mashal@fedoraproject.org> 2.10.9-1
- Update to 2.10.9
* Thu Sep 26 2013 Rex Dieter <rdieter@fedoraproject.org> 2.10.7-9
- add explicit avahi build deps
* Thu Aug 8 2013 Jan Synáček <jsynacek@redhat.com> - 2.10.7-8
- Remove versioned docdirs, BZ 994039
* Sun Aug 4 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 2.10.7-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Thu Aug 1 2013 Petr Pisar <ppisar@redhat.com> - 2.10.7-6
- Perl 5.18 rebuild
* Fri Jul 19 2013 Orion Poplawski <orion@cora.nwra.com> - 2.10.7-5
- Fix setting -fstack-protector on F20+, use -fstack-protector-strong there
- Filter out provides from plugins
* Wed Jul 17 2013 Petr Pisar <ppisar@redhat.com> - 2.10.7-4
- Perl 5.18 rebuild
* Mon Jul 1 2013 Jan Synáček <jsynacek@redhat.com> - 2.10.7-3
- Require cyrus-sasl-scram, BZ 979052
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1056473 - CVE-2012-6152 pidgin: DoS when decoding non-UTF-8
strings in Yahoo protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056473
[ 2 ] Bug #1056479 - CVE-2013-6477 pidgin: DoS when handling timestamps in
the XMPP plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056479
[ 3 ] Bug #1056904 - CVE-2013-6478 pidgin: DoS when rendering long URLs
https://bugzilla.redhat.com/show_bug.cgi?id=1056904
[ 4 ] Bug #1056907 - CVE-2013-6479 pidgin: DoS when parsing certain HTTP
response headers
https://bugzilla.redhat.com/show_bug.cgi?id=1056907
[ 5 ] Bug #1056908 - CVE-2013-6481 pidgin: DoS caused due to OOB read in
Yahoo protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056908
[ 6 ] Bug #1056913 - CVE-2013-6482 pidgin: DoS via multiple null pointer
dereferences in MSN protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056913
[ 7 ] Bug #1056978 - CVE-2013-6483 pidgin: Possible spoofing using iq replies
in XMPP protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056978
[ 8 ] Bug #1057481 - CVE-2013-6484 pidgin: DoS via specially-crafted stun
messages
https://bugzilla.redhat.com/show_bug.cgi?id=1057481
[ 9 ] Bug #1057484 - CVE-2013-6485 pidgin: Heap-based buffer overflow when
parsing chunked HTTP responses
https://bugzilla.redhat.com/show_bug.cgi?id=1057484
[ 10 ] Bug #1057489 - CVE-2013-6487 pidgin: Heap-based buffer overflow in
Gadu-Gadu protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1057489
[ 11 ] Bug #1057490 - CVE-2013-6489 pidgin: Heap-based buffer overflow in
MXit emoticon parsing
https://bugzilla.redhat.com/show_bug.cgi?id=1057490
[ 12 ] Bug #1057498 - CVE-2013-6490 pidgin: Heap-based buffer overflow in
SIMPLE protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1057498
[ 13 ] Bug #1057502 - CVE-2014-0020 pidgin: DoS in IRC protocol plugin due to
arguement parsing
https://bugzilla.redhat.com/show_bug.cgi?id=1057502
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update pidgin' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung