—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3806-1 security@debian.org
https://www.debian.org/security/ Luciano Bello
March 10, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : pidgin
CVE ID : CVE-2017-2640
It was discovered a vulnerability in Pidgin, a multi-protocol instant
messaging client. A server controlled by an attacker can send an invalid
XML that can trigger an out-of-bound memory access. This might lead to a
crash or, in some extreme cases, to remote code execution in the
client-side.
For the stable distribution (jessie), this problem has been fixed in
version 2.11.0-0+deb8u2.
For the unstable distribution (sid), this problem has been fixed in
version 2.12.0-1.
We recommend that you upgrade your pidgin packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=RtpH
—–END PGP SIGNATURE—–