Debian: DSA-1805-1: New pidgin packages fix several vulnerabilities

    Date22 May 2009
    CategoryDebian
    51
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in Pidgin, a graphical multi-protocol instant messaging client. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1805-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                       Moritz Muehlenhoff
    May 22, 2009                          http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : pidgin
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2009-1373 CVE-2009-1375 CVE-2009-1376
    
    Several vulnerabilities have been discovered in Pidgin, a graphical
    multi-protocol instant messaging client. The Common Vulnerabilities and
    Exposures project identifies the following problems:
    
    CVE-2009-1373
    
        A buffer overflow in the Jabber file transfer code may lead to
        denial of service or the execution of arbitrary code.
    
    CVE-2009-1375
    
        Memory corruption in an internal library may lead to denial of
        service.
    
    CVE-2009-1376
    
        The patch provided for the security issue tracked as CVE-2008-2927
        - integer overflows in the MSN protocol handler - was found to be
        incomplete.
    
    The old stable distribution (etch) is affected under the source package
    name gaim. However, due to build problems the updated packages couldn't
    be released along with the stable version. It will be released once the
    build problem is resolved.
    
    For the stable distribution (lenny), these problems have been fixed in
    version 2.4.3-4lenny2.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 2.5.6-1.
    
    We recommend that you upgrade your pidgin packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.dsc
        Size/MD5 checksum:     1784 3cfbe1a429a466d82ca72b8c1ac40754
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.diff.gz
        Size/MD5 checksum:    67015 ca8a67c8a5fbb7952c39e96dfc1c92d6
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3.orig.tar.gz
        Size/MD5 checksum: 13123610 d0e0bd218fbc67df8b2eca2f21fcd427
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple-bin_2.4.3-4lenny2_all.deb
        Size/MD5 checksum:   133450 0da42200c15fa112d10949833c7b656d
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple-dev_2.4.3-4lenny2_all.deb
        Size/MD5 checksum:   276786 98123cf4a705addb4f011b1a9aa42806
      http://security.debian.org/pool/updates/main/p/pidgin/finch-dev_2.4.3-4lenny2_all.deb
        Size/MD5 checksum:   159310 af40922a5c347da65bb3287d7832f488
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dev_2.4.3-4lenny2_all.deb
        Size/MD5 checksum:   193330 79cfc03245a6ee2d54f3f1f8f2437f97
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-data_2.4.3-4lenny2_all.deb
        Size/MD5 checksum:  7018686 2c14cc93703b4d57f1134280ef019f87
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_alpha.deb
        Size/MD5 checksum:   776034 998feb438dce3551770cc3f98576246b
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_alpha.deb
        Size/MD5 checksum:  5543240 5190a80c71672e30de68d6f5ce3385f5
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_alpha.deb
        Size/MD5 checksum:   370102 6ca853190995d40ffe833c19a9d0b130
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_alpha.deb
        Size/MD5 checksum:  1800160 f6d957047912550df9f2876cc3ae7d8a
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_amd64.deb
        Size/MD5 checksum:  5669542 1e21b6071f0947ac4153147ff07bb546
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_amd64.deb
        Size/MD5 checksum:   727040 bef84ab7a06038f3c47532809873823f
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_amd64.deb
        Size/MD5 checksum:   347640 8d9b18516cb3f836cafed50fca1425dd
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_amd64.deb
        Size/MD5 checksum:  1713090 e6224ab98f1d68df3cb10a6c2033bf06
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_arm.deb
        Size/MD5 checksum:   656814 240d7bf1b6f79ad6a31fed92eedf6080
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_arm.deb
        Size/MD5 checksum:  5358320 f7c4ea8a35083db8e461bad0b70906fa
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_arm.deb
        Size/MD5 checksum:   316126 68b0666de2045a8574f7d50919883858
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_arm.deb
        Size/MD5 checksum:  1490918 46ae049e5cb0539870f305e4868e2e42
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_armel.deb
        Size/MD5 checksum:  5383624 73ae62f4b416c5ebfc792231c66f8ca1
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_armel.deb
        Size/MD5 checksum:   319456 546b24abfb2c38aa2572ba90c48bc095
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_armel.deb
        Size/MD5 checksum:   667564 a30c4906f3ad9ca042741c122b99cf31
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_armel.deb
        Size/MD5 checksum:  1494952 a51898e2f3766423dbe6b584769b6db0
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_hppa.deb
        Size/MD5 checksum:   753668 f70ef43544c55771852789bec4bf94e0
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_hppa.deb
        Size/MD5 checksum:  5489574 64a4227ef892258851004c21841b94e6
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_hppa.deb
        Size/MD5 checksum:   361010 52121ede100f605ea53423fff2d7300a
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_hppa.deb
        Size/MD5 checksum:  1827456 aacc5b3a8fadc0d4576e7a191c457e68
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_i386.deb
        Size/MD5 checksum:  1584030 b7241b147ae106b236b3c19860b3fd04
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_i386.deb
        Size/MD5 checksum:   680872 399492517586fb1277892bd3fb3bf7b5
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_i386.deb
        Size/MD5 checksum:  5374090 0408715682fda4b1fcb1945e7d6770ee
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_i386.deb
        Size/MD5 checksum:   326552 eba36a04da368b35f858a88f1034469c
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_ia64.deb
        Size/MD5 checksum:   948018 def22510f06bbb084d56b6c402a474cc
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_ia64.deb
        Size/MD5 checksum:  2194234 8891d61cba33f2a9e434e7e12541a636
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_ia64.deb
        Size/MD5 checksum:   434572 19b4d9631440cf2fe92abfd032ed8bfd
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_ia64.deb
        Size/MD5 checksum:  5223568 d6e5076c460293e3265147b26434c1d8
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mips.deb
        Size/MD5 checksum:  5655552 3939bde10319e1ed310d607f782e692e
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mips.deb
        Size/MD5 checksum:   653818 5ba191b2eb2d299ab36f8f08a2261bf4
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mips.deb
        Size/MD5 checksum:   318128 3e41d036421525584379abce4d893d17
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mips.deb
        Size/MD5 checksum:  1373126 f4d12c42ad8577233f6f289e5ee27a49
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mipsel.deb
        Size/MD5 checksum:   318118 2f291b88715934b7ab36f6f551e5bb25
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mipsel.deb
        Size/MD5 checksum:  1358266 ca0716e2a4bcf3d6737913a6f13b03ab
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mipsel.deb
        Size/MD5 checksum:   650804 258c2a0b93d7714120346ec6037c79f2
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mipsel.deb
        Size/MD5 checksum:  5544090 ff48eadd054ae5c758920e8ca8f42df4
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_powerpc.deb
        Size/MD5 checksum:  1760236 03b52ff4df575157cc21ed1b86e925af
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_powerpc.deb
        Size/MD5 checksum:   362840 9f65e44425a193783f9f1201050a6be3
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_powerpc.deb
        Size/MD5 checksum:  5578900 0e70281f616a1cd67d02c4a5e07c776f
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_powerpc.deb
        Size/MD5 checksum:   753758 642d77cf4334d7c4aa8a84bb7d9699f8
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_s390.deb
        Size/MD5 checksum:   717168 cd1cb86f77fe1e618d9672d28af70170
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_s390.deb
        Size/MD5 checksum:  5566916 20978bccaccbc40cbc5d4724627f148c
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_s390.deb
        Size/MD5 checksum:   358728 8bab5444b68d96d61ad17d4a06572828
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_s390.deb
        Size/MD5 checksum:  1645716 c70783f5beacb8de41aecec6716f1a5a
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_sparc.deb
        Size/MD5 checksum:  5138450 93d398c20768690981b72145004b55cb
      http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_sparc.deb
        Size/MD5 checksum:   682926 4487a4faeb57750c1b63a437caefee8c
      http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_sparc.deb
        Size/MD5 checksum:  1587786 2d2a043944b81d6cbcedf092c9f6e005
      http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_sparc.deb
        Size/MD5 checksum:   327572 9dcaa99102693093ef770e24e748dd0c
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":16,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":32,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.