-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 intrigeri uploaded new packages for pidgin which fixed the following security problems:
CVE-2013-6477 Jaime Breva Ribes discovered that a remote XMPP user can trigger a crash by sending a message with a timestamp in the distant future. CVE-2013-6478 Pidgin could be crashed through overly wide tooltip windows. CVE-2013-6479 Jacob Appelbaum discovered that a malicious server or a "man in the middle" could send a malformed HTTP header resulting in denial of service. CVE-2013-6481 Daniel Atallah discovered that Pidgin could be crashed through malformed Yahoo! P2P messages. CVE-2013-6482 Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin could be crashed through malformed MSN messages. CVE-2013-6483 Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin could be crashed through malformed XMPP messages. CVE-2013-6484 It was discovered that incorrect error handling when reading the response from a STUN server could result in a crash. CVE-2013-6485 Matt Jones discovered a buffer overflow in the parsing of malformed HTTP responses. CVE-2013-6487 Yves Younan and Ryan Pentney discovered a buffer overflow when parsing Gadu-Gadu messages. CVE-2013-6489 Yves Younan and Pawel Janic discovered an integer overflow when parsing MXit emoticons. CVE-2013-6490 Yves Younan discovered a buffer overflow when parsing SIMPLE headers. CVE-2014-0020 Daniel Atallah discovered that Pidgin could be crashed via malformed IRC arguments. For the squeeze-backports distribution the problems have been fixed in version 2.10.9-1~bpo60+1. For the oldstable distribution (squeeze), no direct backport is provided. One should use the fixed package from squeeze-backports instead. For the stable distribution (wheezy), these problems have been fixed in version 2.10.9-1~deb7u1. For the unstable distribution (sid), these problems have been fixed in version 2.10.9-1. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJS/0HXAAoJELrOFdKldJj/oRIP/2dJftKy+V7kZ4aOOrn82t9Z t51RaJI/yXnd/vXwUsQ9q4mMLqaOVHKleakfJOPD1RsJsaCeGlNYf9GoqJvBlwbT /wpr8TXC9/AYQRd4J7iOXS4E7sDaq2syjQ+BOvr2n7cwBAru9iPMoz0K1hTE4v2g 2cBNVr1ZBoBhPtoRoXXF3QDR21/oA9/AcL3jKgyTVtCYWAYRqRR2zwRnY96Pz7gG rc00KglS6FixWVtlw9MVLv8L1FBF7VHKdQPdMer82GGzT6ju8UTd0nrVt/2/L22J 0B06OHDGGqkftghCOXs+ZfaQL0AfASK6SRs8JGmTX70tTnFU1aHzdRAdfzl9Oocf qfR/LEz4Mmq9PlQ6F5d0vtlr2Rt1KqvsWiiWUxrvn4KmDb2HSHYnbRbwkIkvcCW1 Uude8BITt+36XpniE9Li3OQwbTpFsVQ6w52XfLBZRTYMtmkIA8FHWx7i8BY3As7/ RONMd7VOPGXwnMGP05ttXPvakVoZv2Qj1TsM/ct1U26UHns7gfqPhcv1nxdp+KuX x+Vs5j/RchW5+MCRVyYaEhQ9yKiiQpfMCAStpGsAd3a8eafWKEb4b18DlrUsZDIT JXEBIEbYG7qkGxgzYbfG0lUH8lgmSKnOK1RO0NJyK44QscFQ1wqHT9R1Ziesvnad ktl7EqW8N+Sxaw1haDnY =EcTr -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]
