Linux Security
Linux Security
Linux Security

Debian: DSA-1805-1: New pidgin packages fix several vulnerabilities

Date 22 May 2009
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in Pidgin, a graphical multi-protocol instant messaging client. The Common Vulnerabilities and Exposures project identifies the following problems:
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1805-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
May 22, 2009                
- ------------------------------------------------------------------------

Package        : pidgin
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2009-1373 CVE-2009-1375 CVE-2009-1376

Several vulnerabilities have been discovered in Pidgin, a graphical
multi-protocol instant messaging client. The Common Vulnerabilities and
Exposures project identifies the following problems:


    A buffer overflow in the Jabber file transfer code may lead to
    denial of service or the execution of arbitrary code.


    Memory corruption in an internal library may lead to denial of


    The patch provided for the security issue tracked as CVE-2008-2927
    - integer overflows in the MSN protocol handler - was found to be

The old stable distribution (etch) is affected under the source package
name gaim. However, due to build problems the updated packages couldn't
be released along with the stable version. It will be released once the
build problem is resolved.

For the stable distribution (lenny), these problems have been fixed in
version 2.4.3-4lenny2.

For the unstable distribution (sid), these problems have been fixed in
version 2.5.6-1.

We recommend that you upgrade your pidgin packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:     1784 3cfbe1a429a466d82ca72b8c1ac40754
    Size/MD5 checksum:    67015 ca8a67c8a5fbb7952c39e96dfc1c92d6
    Size/MD5 checksum: 13123610 d0e0bd218fbc67df8b2eca2f21fcd427

Architecture independent packages:
    Size/MD5 checksum:   133450 0da42200c15fa112d10949833c7b656d
    Size/MD5 checksum:   276786 98123cf4a705addb4f011b1a9aa42806
    Size/MD5 checksum:   159310 af40922a5c347da65bb3287d7832f488
    Size/MD5 checksum:   193330 79cfc03245a6ee2d54f3f1f8f2437f97
    Size/MD5 checksum:  7018686 2c14cc93703b4d57f1134280ef019f87

alpha architecture (DEC Alpha)
    Size/MD5 checksum:   776034 998feb438dce3551770cc3f98576246b
    Size/MD5 checksum:  5543240 5190a80c71672e30de68d6f5ce3385f5
    Size/MD5 checksum:   370102 6ca853190995d40ffe833c19a9d0b130
    Size/MD5 checksum:  1800160 f6d957047912550df9f2876cc3ae7d8a

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:  5669542 1e21b6071f0947ac4153147ff07bb546
    Size/MD5 checksum:   727040 bef84ab7a06038f3c47532809873823f
    Size/MD5 checksum:   347640 8d9b18516cb3f836cafed50fca1425dd
    Size/MD5 checksum:  1713090 e6224ab98f1d68df3cb10a6c2033bf06

arm architecture (ARM)
    Size/MD5 checksum:   656814 240d7bf1b6f79ad6a31fed92eedf6080
    Size/MD5 checksum:  5358320 f7c4ea8a35083db8e461bad0b70906fa
    Size/MD5 checksum:   316126 68b0666de2045a8574f7d50919883858
    Size/MD5 checksum:  1490918 46ae049e5cb0539870f305e4868e2e42

armel architecture (ARM EABI)
    Size/MD5 checksum:  5383624 73ae62f4b416c5ebfc792231c66f8ca1
    Size/MD5 checksum:   319456 546b24abfb2c38aa2572ba90c48bc095
    Size/MD5 checksum:   667564 a30c4906f3ad9ca042741c122b99cf31
    Size/MD5 checksum:  1494952 a51898e2f3766423dbe6b584769b6db0

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   753668 f70ef43544c55771852789bec4bf94e0
    Size/MD5 checksum:  5489574 64a4227ef892258851004c21841b94e6
    Size/MD5 checksum:   361010 52121ede100f605ea53423fff2d7300a
    Size/MD5 checksum:  1827456 aacc5b3a8fadc0d4576e7a191c457e68

i386 architecture (Intel ia32)
    Size/MD5 checksum:  1584030 b7241b147ae106b236b3c19860b3fd04
    Size/MD5 checksum:   680872 399492517586fb1277892bd3fb3bf7b5
    Size/MD5 checksum:  5374090 0408715682fda4b1fcb1945e7d6770ee
    Size/MD5 checksum:   326552 eba36a04da368b35f858a88f1034469c

ia64 architecture (Intel ia64)
    Size/MD5 checksum:   948018 def22510f06bbb084d56b6c402a474cc
    Size/MD5 checksum:  2194234 8891d61cba33f2a9e434e7e12541a636
    Size/MD5 checksum:   434572 19b4d9631440cf2fe92abfd032ed8bfd
    Size/MD5 checksum:  5223568 d6e5076c460293e3265147b26434c1d8

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:  5655552 3939bde10319e1ed310d607f782e692e
    Size/MD5 checksum:   653818 5ba191b2eb2d299ab36f8f08a2261bf4
    Size/MD5 checksum:   318128 3e41d036421525584379abce4d893d17
    Size/MD5 checksum:  1373126 f4d12c42ad8577233f6f289e5ee27a49

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   318118 2f291b88715934b7ab36f6f551e5bb25
    Size/MD5 checksum:  1358266 ca0716e2a4bcf3d6737913a6f13b03ab
    Size/MD5 checksum:   650804 258c2a0b93d7714120346ec6037c79f2
    Size/MD5 checksum:  5544090 ff48eadd054ae5c758920e8ca8f42df4

powerpc architecture (PowerPC)
    Size/MD5 checksum:  1760236 03b52ff4df575157cc21ed1b86e925af
    Size/MD5 checksum:   362840 9f65e44425a193783f9f1201050a6be3
    Size/MD5 checksum:  5578900 0e70281f616a1cd67d02c4a5e07c776f
    Size/MD5 checksum:   753758 642d77cf4334d7c4aa8a84bb7d9699f8

s390 architecture (IBM S/390)
    Size/MD5 checksum:   717168 cd1cb86f77fe1e618d9672d28af70170
    Size/MD5 checksum:  5566916 20978bccaccbc40cbc5d4724627f148c
    Size/MD5 checksum:   358728 8bab5444b68d96d61ad17d4a06572828
    Size/MD5 checksum:  1645716 c70783f5beacb8de41aecec6716f1a5a

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  5138450 93d398c20768690981b72145004b55cb
    Size/MD5 checksum:   682926 4487a4faeb57750c1b63a437caefee8c
    Size/MD5 checksum:  1587786 2d2a043944b81d6cbcedf092c9f6e005
    Size/MD5 checksum:   327572 9dcaa99102693093ef770e24e748dd0c

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Package info: `apt-cache show ' and

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.