LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New pidgin packages fix several vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1805-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
May 22, 2009                          http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : pidgin
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2009-1373 CVE-2009-1375 CVE-2009-1376

Several vulnerabilities have been discovered in Pidgin, a graphical
multi-protocol instant messaging client. The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2009-1373

    A buffer overflow in the Jabber file transfer code may lead to
    denial of service or the execution of arbitrary code.

CVE-2009-1375

    Memory corruption in an internal library may lead to denial of
    service.

CVE-2009-1376

    The patch provided for the security issue tracked as CVE-2008-2927
    - integer overflows in the MSN protocol handler - was found to be
    incomplete.

The old stable distribution (etch) is affected under the source package
name gaim. However, due to build problems the updated packages couldn't
be released along with the stable version. It will be released once the
build problem is resolved.

For the stable distribution (lenny), these problems have been fixed in
version 2.4.3-4lenny2.

For the unstable distribution (sid), these problems have been fixed in
version 2.5.6-1.

We recommend that you upgrade your pidgin packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.dsc
    Size/MD5 checksum:     1784 3cfbe1a429a466d82ca72b8c1ac40754
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.diff.gz
    Size/MD5 checksum:    67015 ca8a67c8a5fbb7952c39e96dfc1c92d6
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3.orig.tar.gz
    Size/MD5 checksum: 13123610 d0e0bd218fbc67df8b2eca2f21fcd427

Architecture independent packages:

  http://security.debian.org/pool/updates/main/p/pidgin/libpurple-bin_2.4.3-4lenny2_all.deb
    Size/MD5 checksum:   133450 0da42200c15fa112d10949833c7b656d
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple-dev_2.4.3-4lenny2_all.deb
    Size/MD5 checksum:   276786 98123cf4a705addb4f011b1a9aa42806
  http://security.debian.org/pool/updates/main/p/pidgin/finch-dev_2.4.3-4lenny2_all.deb
    Size/MD5 checksum:   159310 af40922a5c347da65bb3287d7832f488
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dev_2.4.3-4lenny2_all.deb
    Size/MD5 checksum:   193330 79cfc03245a6ee2d54f3f1f8f2437f97
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-data_2.4.3-4lenny2_all.deb
    Size/MD5 checksum:  7018686 2c14cc93703b4d57f1134280ef019f87

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_alpha.deb
    Size/MD5 checksum:   776034 998feb438dce3551770cc3f98576246b
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_alpha.deb
    Size/MD5 checksum:  5543240 5190a80c71672e30de68d6f5ce3385f5
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_alpha.deb
    Size/MD5 checksum:   370102 6ca853190995d40ffe833c19a9d0b130
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_alpha.deb
    Size/MD5 checksum:  1800160 f6d957047912550df9f2876cc3ae7d8a

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_amd64.deb
    Size/MD5 checksum:  5669542 1e21b6071f0947ac4153147ff07bb546
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_amd64.deb
    Size/MD5 checksum:   727040 bef84ab7a06038f3c47532809873823f
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_amd64.deb
    Size/MD5 checksum:   347640 8d9b18516cb3f836cafed50fca1425dd
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_amd64.deb
    Size/MD5 checksum:  1713090 e6224ab98f1d68df3cb10a6c2033bf06

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_arm.deb
    Size/MD5 checksum:   656814 240d7bf1b6f79ad6a31fed92eedf6080
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_arm.deb
    Size/MD5 checksum:  5358320 f7c4ea8a35083db8e461bad0b70906fa
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_arm.deb
    Size/MD5 checksum:   316126 68b0666de2045a8574f7d50919883858
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_arm.deb
    Size/MD5 checksum:  1490918 46ae049e5cb0539870f305e4868e2e42

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_armel.deb
    Size/MD5 checksum:  5383624 73ae62f4b416c5ebfc792231c66f8ca1
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_armel.deb
    Size/MD5 checksum:   319456 546b24abfb2c38aa2572ba90c48bc095
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_armel.deb
    Size/MD5 checksum:   667564 a30c4906f3ad9ca042741c122b99cf31
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_armel.deb
    Size/MD5 checksum:  1494952 a51898e2f3766423dbe6b584769b6db0

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_hppa.deb
    Size/MD5 checksum:   753668 f70ef43544c55771852789bec4bf94e0
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_hppa.deb
    Size/MD5 checksum:  5489574 64a4227ef892258851004c21841b94e6
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_hppa.deb
    Size/MD5 checksum:   361010 52121ede100f605ea53423fff2d7300a
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_hppa.deb
    Size/MD5 checksum:  1827456 aacc5b3a8fadc0d4576e7a191c457e68

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_i386.deb
    Size/MD5 checksum:  1584030 b7241b147ae106b236b3c19860b3fd04
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_i386.deb
    Size/MD5 checksum:   680872 399492517586fb1277892bd3fb3bf7b5
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_i386.deb
    Size/MD5 checksum:  5374090 0408715682fda4b1fcb1945e7d6770ee
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_i386.deb
    Size/MD5 checksum:   326552 eba36a04da368b35f858a88f1034469c

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_ia64.deb
    Size/MD5 checksum:   948018 def22510f06bbb084d56b6c402a474cc
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_ia64.deb
    Size/MD5 checksum:  2194234 8891d61cba33f2a9e434e7e12541a636
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_ia64.deb
    Size/MD5 checksum:   434572 19b4d9631440cf2fe92abfd032ed8bfd
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_ia64.deb
    Size/MD5 checksum:  5223568 d6e5076c460293e3265147b26434c1d8

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mips.deb
    Size/MD5 checksum:  5655552 3939bde10319e1ed310d607f782e692e
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mips.deb
    Size/MD5 checksum:   653818 5ba191b2eb2d299ab36f8f08a2261bf4
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mips.deb
    Size/MD5 checksum:   318128 3e41d036421525584379abce4d893d17
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mips.deb
    Size/MD5 checksum:  1373126 f4d12c42ad8577233f6f289e5ee27a49

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mipsel.deb
    Size/MD5 checksum:   318118 2f291b88715934b7ab36f6f551e5bb25
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mipsel.deb
    Size/MD5 checksum:  1358266 ca0716e2a4bcf3d6737913a6f13b03ab
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mipsel.deb
    Size/MD5 checksum:   650804 258c2a0b93d7714120346ec6037c79f2
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mipsel.deb
    Size/MD5 checksum:  5544090 ff48eadd054ae5c758920e8ca8f42df4

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_powerpc.deb
    Size/MD5 checksum:  1760236 03b52ff4df575157cc21ed1b86e925af
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_powerpc.deb
    Size/MD5 checksum:   362840 9f65e44425a193783f9f1201050a6be3
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_powerpc.deb
    Size/MD5 checksum:  5578900 0e70281f616a1cd67d02c4a5e07c776f
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_powerpc.deb
    Size/MD5 checksum:   753758 642d77cf4334d7c4aa8a84bb7d9699f8

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_s390.deb
    Size/MD5 checksum:   717168 cd1cb86f77fe1e618d9672d28af70170
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_s390.deb
    Size/MD5 checksum:  5566916 20978bccaccbc40cbc5d4724627f148c
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_s390.deb
    Size/MD5 checksum:   358728 8bab5444b68d96d61ad17d4a06572828
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_s390.deb
    Size/MD5 checksum:  1645716 c70783f5beacb8de41aecec6716f1a5a

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_sparc.deb
    Size/MD5 checksum:  5138450 93d398c20768690981b72145004b55cb
  http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_sparc.deb
    Size/MD5 checksum:   682926 4487a4faeb57750c1b63a437caefee8c
  http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_sparc.deb
    Size/MD5 checksum:  1587786 2d2a043944b81d6cbcedf092c9f6e005
  http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_sparc.deb
    Size/MD5 checksum:   327572 9dcaa99102693093ef770e24e748dd0c


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.