This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============0601363562021518599==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0
Content-Type: multipart/mixed; boundary="QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <578524EE.7020304@canonical.com>
Subject: [USN-3031-1] Pidgin vulnerabilities
--QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3031-1
July 12, 2016
pidgin vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Pidgin could be made to crash or run programs if it received
specially crafted network traffic.
Software Description:
- pidgin: graphical multi-protocol instant messaging client for X
Details:
Yves Younan discovered that Pidgin contained multiple issues in the MXit
protocol support. A remote attacker could use this issue to cause Pidgin to
crash, resulting in a denial of service, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
libpurple0 1:2.10.11-0ubuntu4.2
Ubuntu 14.04 LTS:
libpurple0 1:2.10.9-0ubuntu3.3
Ubuntu 12.04 LTS:
libpurple0 1:2.10.3-0ubuntu1.7
After a standard system update you need to restart Pidgin to make all the
necessary changes.
References:
http://www.ubuntu.com/usn/usn-3031-1
CVE-2016-2365, CVE-2016-2366, CVE-2016-2367, CVE-2016-2368,
CVE-2016-2369, CVE-2016-2370, CVE-2016-2371, CVE-2016-2372,
CVE-2016-2373, CVE-2016-2374, CVE-2016-2375, CVE-2016-2376,
CVE-2016-2377, CVE-2016-2378, CVE-2016-2380, CVE-2016-4323
Package Information:
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.11-0ubuntu4.2
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.9-0ubuntu3.3
https://launchpad.net/ubuntu/+source/pidgin/1:2.10.3-0ubuntu1.7
--QFxsw2K2IdIXtd7JxEtJDoVu5nTg6Phbx--
--0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=5mE2
-----END PGP SIGNATURE-----
--0RrORL6L6kodNbTWDg1KGvMtIJogiXsT0--
--===============0601363562021518599==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0601363562021518599==--
|