This issue was resolved and addressed in GLSA 201209-17 at http://security.gentoo.org/glsa/glsa-201209-17.xml by GLSA coordinator Sean Amoss (ackle).
-- You received this bug notification because you are a member of Desktop Packages, which is subscribed to pidgin in Ubuntu. https://bugs.launchpad.net/bugs/1022012 Title: (CVE-2012-3374) <pidgin-2.10.5: MXit buffer overflow Status in Pidgin: Fix Released Status in “pidgin” package in Ubuntu: Fix Released Status in “pidgin” package in Fedora: Unknown Status in Gentoo Linux: Fix Released Bug description: A new update, version 2.10.5, to the open source Pidgin instant messaging program has been released, closing an important security hole. Previous versions of Pidgin contained a vulnerability, discovered by Ulf Härnhammar, in the MXit component, where parsing incoming messages with inline images led to a buffer overflow. The developers say that this could have been exploited by an attacker to execute arbitrary code on a victim's system by using a specially crafted message. Versions up to and including 2.10.4 are affected. Upgrading to Pidgin 2.10.5 fixes the problem; all users are advised to upgrade. Other bugs, including an issue that caused the application to crash, have also been fixed. http://www.pidgin.im/news/security/index.php?id=64 To manage notifications about this bug go to: https://bugs.launchpad.net/pidgin/+bug/1022012/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp