Linux Security
    Linux Security
    Linux Security

    Debian: DSA-1805-1: New pidgin packages fix several vulnerabilities

    Date 22 May 2009
    Posted By LinuxSecurity Advisories
    Several vulnerabilities have been discovered in Pidgin, a graphical multi-protocol instant messaging client. The Common Vulnerabilities and Exposures project identifies the following problems:
    Hash: SHA1
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1805-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
    May 22, 2009                
    - ------------------------------------------------------------------------
    Package        : pidgin
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2009-1373 CVE-2009-1375 CVE-2009-1376
    Several vulnerabilities have been discovered in Pidgin, a graphical
    multi-protocol instant messaging client. The Common Vulnerabilities and
    Exposures project identifies the following problems:
        A buffer overflow in the Jabber file transfer code may lead to
        denial of service or the execution of arbitrary code.
        Memory corruption in an internal library may lead to denial of
        The patch provided for the security issue tracked as CVE-2008-2927
        - integer overflows in the MSN protocol handler - was found to be
    The old stable distribution (etch) is affected under the source package
    name gaim. However, due to build problems the updated packages couldn't
    be released along with the stable version. It will be released once the
    build problem is resolved.
    For the stable distribution (lenny), these problems have been fixed in
    version 2.4.3-4lenny2.
    For the unstable distribution (sid), these problems have been fixed in
    version 2.5.6-1.
    We recommend that you upgrade your pidgin packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:     1784 3cfbe1a429a466d82ca72b8c1ac40754
        Size/MD5 checksum:    67015 ca8a67c8a5fbb7952c39e96dfc1c92d6
        Size/MD5 checksum: 13123610 d0e0bd218fbc67df8b2eca2f21fcd427
    Architecture independent packages:
        Size/MD5 checksum:   133450 0da42200c15fa112d10949833c7b656d
        Size/MD5 checksum:   276786 98123cf4a705addb4f011b1a9aa42806
        Size/MD5 checksum:   159310 af40922a5c347da65bb3287d7832f488
        Size/MD5 checksum:   193330 79cfc03245a6ee2d54f3f1f8f2437f97
        Size/MD5 checksum:  7018686 2c14cc93703b4d57f1134280ef019f87
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:   776034 998feb438dce3551770cc3f98576246b
        Size/MD5 checksum:  5543240 5190a80c71672e30de68d6f5ce3385f5
        Size/MD5 checksum:   370102 6ca853190995d40ffe833c19a9d0b130
        Size/MD5 checksum:  1800160 f6d957047912550df9f2876cc3ae7d8a
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:  5669542 1e21b6071f0947ac4153147ff07bb546
        Size/MD5 checksum:   727040 bef84ab7a06038f3c47532809873823f
        Size/MD5 checksum:   347640 8d9b18516cb3f836cafed50fca1425dd
        Size/MD5 checksum:  1713090 e6224ab98f1d68df3cb10a6c2033bf06
    arm architecture (ARM)
        Size/MD5 checksum:   656814 240d7bf1b6f79ad6a31fed92eedf6080
        Size/MD5 checksum:  5358320 f7c4ea8a35083db8e461bad0b70906fa
        Size/MD5 checksum:   316126 68b0666de2045a8574f7d50919883858
        Size/MD5 checksum:  1490918 46ae049e5cb0539870f305e4868e2e42
    armel architecture (ARM EABI)
        Size/MD5 checksum:  5383624 73ae62f4b416c5ebfc792231c66f8ca1
        Size/MD5 checksum:   319456 546b24abfb2c38aa2572ba90c48bc095
        Size/MD5 checksum:   667564 a30c4906f3ad9ca042741c122b99cf31
        Size/MD5 checksum:  1494952 a51898e2f3766423dbe6b584769b6db0
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   753668 f70ef43544c55771852789bec4bf94e0
        Size/MD5 checksum:  5489574 64a4227ef892258851004c21841b94e6
        Size/MD5 checksum:   361010 52121ede100f605ea53423fff2d7300a
        Size/MD5 checksum:  1827456 aacc5b3a8fadc0d4576e7a191c457e68
    i386 architecture (Intel ia32)
        Size/MD5 checksum:  1584030 b7241b147ae106b236b3c19860b3fd04
        Size/MD5 checksum:   680872 399492517586fb1277892bd3fb3bf7b5
        Size/MD5 checksum:  5374090 0408715682fda4b1fcb1945e7d6770ee
        Size/MD5 checksum:   326552 eba36a04da368b35f858a88f1034469c
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:   948018 def22510f06bbb084d56b6c402a474cc
        Size/MD5 checksum:  2194234 8891d61cba33f2a9e434e7e12541a636
        Size/MD5 checksum:   434572 19b4d9631440cf2fe92abfd032ed8bfd
        Size/MD5 checksum:  5223568 d6e5076c460293e3265147b26434c1d8
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  5655552 3939bde10319e1ed310d607f782e692e
        Size/MD5 checksum:   653818 5ba191b2eb2d299ab36f8f08a2261bf4
        Size/MD5 checksum:   318128 3e41d036421525584379abce4d893d17
        Size/MD5 checksum:  1373126 f4d12c42ad8577233f6f289e5ee27a49
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   318118 2f291b88715934b7ab36f6f551e5bb25
        Size/MD5 checksum:  1358266 ca0716e2a4bcf3d6737913a6f13b03ab
        Size/MD5 checksum:   650804 258c2a0b93d7714120346ec6037c79f2
        Size/MD5 checksum:  5544090 ff48eadd054ae5c758920e8ca8f42df4
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  1760236 03b52ff4df575157cc21ed1b86e925af
        Size/MD5 checksum:   362840 9f65e44425a193783f9f1201050a6be3
        Size/MD5 checksum:  5578900 0e70281f616a1cd67d02c4a5e07c776f
        Size/MD5 checksum:   753758 642d77cf4334d7c4aa8a84bb7d9699f8
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   717168 cd1cb86f77fe1e618d9672d28af70170
        Size/MD5 checksum:  5566916 20978bccaccbc40cbc5d4724627f148c
        Size/MD5 checksum:   358728 8bab5444b68d96d61ad17d4a06572828
        Size/MD5 checksum:  1645716 c70783f5beacb8de41aecec6716f1a5a
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:  5138450 93d398c20768690981b72145004b55cb
        Size/MD5 checksum:   682926 4487a4faeb57750c1b63a437caefee8c
        Size/MD5 checksum:  1587786 2d2a043944b81d6cbcedf092c9f6e005
        Size/MD5 checksum:   327572 9dcaa99102693093ef770e24e748dd0c
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.