[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 542-1] pidgin security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : pidgin
Version        : 2.10.10-1~deb7u2
CVE ID         : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
                 CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
                 CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
                 CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323

Numerous security issues have been identified and fixed in Pidgin in
Debian/Wheezy.

CVE-2016-2365

    MXIT Markup Command Denial of Service Vulnerability

CVE-2016-2366

    MXIT Table Command Denial of Service Vulnerability

CVE-2016-2367

    MXIT Avatar Length Memory Disclosure Vulnerability

CVE-2016-2368

    MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities

CVE-2016-2369

    MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability

CVE-2016-2370

    MXIT Custom Resource Denial of Service Vulnerability

CVE-2016-2371

    MXIT Extended Profiles Code Execution Vulnerability

CVE-2016-2372

    MXIT File Transfer Length Memory Disclosure Vulnerability

CVE-2016-2373

    MXIT Contact Mood Denial of Service Vulnerability

CVE-2016-2374

    MXIT MultiMX Message Code Execution Vulnerability

CVE-2016-2375

    MXIT Suggested Contacts Memory Disclosure Vulnerability

CVE-2016-2376

    MXIT read stage 0x3 Code Execution Vulnerability

CVE-2016-2377

    MXIT HTTP Content-Length Buffer Overflow Vulnerability

CVE-2016-2378

    MXIT get_utf8_string Code Execution Vulnerability

CVE-2016-2380

    MXIT mxit_convert_markup_tx Information Leak Vulnerability

CVE-2016-4323

    MXIT Splash Image Arbitrary File Overwrite Vulnerability

For Debian 7 "Wheezy", these problems have been fixed in version
2.10.10-1~deb7u2.

We recommend that you upgrade your pidgin packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -- 
Brian May <bam@debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=S23F
-----END PGP SIGNATURE-----


Reply to: