——————————————————————————–
Fedora Update Notification
FEDORA-2014-2013
2014-02-05 03:00:42
——————————————————————————–
Name : pidgin
Product : Fedora 20
Version : 2.10.9
Release : 1.fc20
URL : http://pidgin.im/
Summary : A Gtk+ based multiprotocol instant messaging client
Description :
Pidgin allows you to talk to anyone using a variety of messaging
protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu,
ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and
Zephyr. These protocols are implemented using a modular, easy to
use design. To use a protocol, just add an account using the
account editor.
Pidgin supports many common features of other clients, as well as many
unique features, such as perl scripting, TCL scripting and C plugins.
Pidgin is not affiliated with or endorsed by America Online, Inc.,
Microsoft Corporation, Yahoo! Inc., or ICQ Inc.
——————————————————————————–
Update Information:
Update to 2.10.9
——————————————————————————–
ChangeLog:
* Mon Feb 3 2014 Dan Mashal <dan.mashal@fedoraproject.org> 2.10.9-1
– Update to 2.10.9
* Thu Sep 26 2013 Rex Dieter <rdieter@fedoraproject.org> 2.10.7-9
– add explicit avahi build deps
——————————————————————————–
References:
[ 1 ] Bug #1056473 – CVE-2012-6152 pidgin: DoS when decoding non-UTF-8 strings in Yahoo protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056473
[ 2 ] Bug #1056479 – CVE-2013-6477 pidgin: DoS when handling timestamps in the XMPP plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056479
[ 3 ] Bug #1056904 – CVE-2013-6478 pidgin: DoS when rendering long URLs
https://bugzilla.redhat.com/show_bug.cgi?id=1056904
[ 4 ] Bug #1056907 – CVE-2013-6479 pidgin: DoS when parsing certain HTTP response headers
https://bugzilla.redhat.com/show_bug.cgi?id=1056907
[ 5 ] Bug #1056908 – CVE-2013-6481 pidgin: DoS caused due to OOB read in Yahoo protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056908
[ 6 ] Bug #1056913 – CVE-2013-6482 pidgin: DoS via multiple null pointer dereferences in MSN protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056913
[ 7 ] Bug #1056978 – CVE-2013-6483 pidgin: Possible spoofing using iq replies in XMPP protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1056978
[ 8 ] Bug #1057481 – CVE-2013-6484 pidgin: DoS via specially-crafted stun messages
https://bugzilla.redhat.com/show_bug.cgi?id=1057481
[ 9 ] Bug #1057484 – CVE-2013-6485 pidgin: Heap-based buffer overflow when parsing chunked HTTP responses
https://bugzilla.redhat.com/show_bug.cgi?id=1057484
[ 10 ] Bug #1057489 – CVE-2013-6487 pidgin: Heap-based buffer overflow in Gadu-Gadu protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1057489
[ 11 ] Bug #1057490 – CVE-2013-6489 pidgin: Heap-based buffer overflow in MXit emoticon parsing
https://bugzilla.redhat.com/show_bug.cgi?id=1057490
[ 12 ] Bug #1057498 – CVE-2013-6490 pidgin: Heap-based buffer overflow in SIMPLE protocol plugin
https://bugzilla.redhat.com/show_bug.cgi?id=1057498
[ 13 ] Bug #1057502 – CVE-2014-0020 pidgin: DoS in IRC protocol plugin due to arguement parsing
https://bugzilla.redhat.com/show_bug.cgi?id=1057502
——————————————————————————–
This update can be installed with the “yum” update program. Use
su -c ‘yum update pidgin’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce