Synopsis: Important: pidgin security and bug fix update
CVE Names: CVE-2008-2927
Description:
An integer overflow flaw was found in Pidgin's MSN protocol handler. If a
user received a malicious MSN message, it was possible to execute arbitrary
code with the permissions of the user running Pidgin. (CVE-2008-2927)
Note: the default Pidgin privacy setting only allows messages from users in
the buddy list. This prevents arbitrary MSN users from exploiting this
flaw.
This update also addresses the following bug:
* when attempting to connect to the ICQ network, Pidgin would fail to
connect, present an alert saying the "The client version you are using is
too old", and de-activate the ICQ account. This update restores Pidgin's
ability to connect to the ICQ network.
SL 3:
Source:
pidgin-1.5.1-2.el3.src.rpm
x86_64:
pidgin-1.5.1-2.el3.x86_64.rpm
SL 4:
Source:
pidgin-1.5.1-2.el4.src.rpm
i386:
pidgin-1.5.1-2.el4.i386.rpm
x86_64:
pidgin-1.5.1-2.el4.x86_64.rpm
SL 5:
Source:
pidgin-2.3.1-2.el5_2.src.rpm
i386:
finch-2.3.1-2.el5_2.i386.rpm
finch-devel-2.3.1-2.el5_2.i386.rpm
libpurple-2.3.1-2.el5_2.i386.rpm
libpurple-devel-2.3.1-2.el5_2.i386.rpm
libpurple-perl-2.3.1-2.el5_2.i386.rpm
libpurple-tcl-2.3.1-2.el5_2.i386.rpm
pidgin-2.3.1-2.el5_2.i386.rpm
pidgin-perl-2.3.1-2.el5_2.i386.rpm
pidgin-devel-2.3.1-2.el5_2.i386.rpm
x86_64:
finch-2.3.1-2.el5_2.i386.rpm
finch-2.3.1-2.el5_2.x86_64.rpm
finch-devel-2.3.1-2.el5_2.i386.rpm
finch-devel-2.3.1-2.el5_2.x86_64.rpm
libpurple-2.3.1-2.el5_2.i386.rpm
libpurple-2.3.1-2.el5_2.x86_64.rpm
libpurple-devel-2.3.1-2.el5_2.i386.rpm
libpurple-devel-2.3.1-2.el5_2.x86_64.rpm
libpurple-perl-2.3.1-2.el5_2.x86_64.rpm
libpurple-tcl-2.3.1-2.el5_2.x86_64.rpm
pidgin-2.3.1-2.el5_2.i386.rpm
pidgin-2.3.1-2.el5_2.x86_64.rpm
pidgin-devel-2.3.1-2.el5_2.i386.rpm
pidgin-devel-2.3.1-2.el5_2.x86_64.rpm
pidgin-perl-2.3.1-2.el5_2.x86_64.rpm
-Connie Sieh
|