"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1805-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
May 22, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : pidgin
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2009-1373 CVE-2009-1375 CVE-2009-1376
Several vulnerabilities have been discovered in Pidgin, a graphical
multi-protocol instant messaging client. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2009-1373
A buffer overflow in the Jabber file transfer code may lead to
denial of service or the execution of arbitrary code.
CVE-2009-1375
Memory corruption in an internal library may lead to denial of
service.
CVE-2009-1376
The patch provided for the security issue tracked as CVE-2008-2927
- integer overflows in the MSN protocol handler - was found to be
incomplete.
The old stable distribution (etch) is affected under the source package
name gaim. However, due to build problems the updated packages couldn't
be released along with the stable version. It will be released once the
build problem is resolved.
For the stable distribution (lenny), these problems have been fixed in
version 2.4.3-4lenny2.
For the unstable distribution (sid), these problems have been fixed in
version 2.5.6-1.
We recommend that you upgrade your pidgin packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.dsc
Size/MD5 checksum: 1784 3cfbe1a429a466d82ca72b8c1ac40754
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2.diff.gz
Size/MD5 checksum: 67015 ca8a67c8a5fbb7952c39e96dfc1c92d6
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3.orig.tar.gz
Size/MD5 checksum: 13123610 d0e0bd218fbc67df8b2eca2f21fcd427
Architecture independent packages:
http://security.debian.org/pool/updates/main/p/pidgin/libpurple-bin_2.4.3-4lenny2_all.deb
Size/MD5 checksum: 133450 0da42200c15fa112d10949833c7b656d
http://security.debian.org/pool/updates/main/p/pidgin/libpurple-dev_2.4.3-4lenny2_all.deb
Size/MD5 checksum: 276786 98123cf4a705addb4f011b1a9aa42806
http://security.debian.org/pool/updates/main/p/pidgin/finch-dev_2.4.3-4lenny2_all.deb
Size/MD5 checksum: 159310 af40922a5c347da65bb3287d7832f488
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dev_2.4.3-4lenny2_all.deb
Size/MD5 checksum: 193330 79cfc03245a6ee2d54f3f1f8f2437f97
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-data_2.4.3-4lenny2_all.deb
Size/MD5 checksum: 7018686 2c14cc93703b4d57f1134280ef019f87
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_alpha.deb
Size/MD5 checksum: 776034 998feb438dce3551770cc3f98576246b
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_alpha.deb
Size/MD5 checksum: 5543240 5190a80c71672e30de68d6f5ce3385f5
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_alpha.deb
Size/MD5 checksum: 370102 6ca853190995d40ffe833c19a9d0b130
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_alpha.deb
Size/MD5 checksum: 1800160 f6d957047912550df9f2876cc3ae7d8a
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_amd64.deb
Size/MD5 checksum: 5669542 1e21b6071f0947ac4153147ff07bb546
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_amd64.deb
Size/MD5 checksum: 727040 bef84ab7a06038f3c47532809873823f
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_amd64.deb
Size/MD5 checksum: 347640 8d9b18516cb3f836cafed50fca1425dd
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_amd64.deb
Size/MD5 checksum: 1713090 e6224ab98f1d68df3cb10a6c2033bf06
arm architecture (ARM)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_arm.deb
Size/MD5 checksum: 656814 240d7bf1b6f79ad6a31fed92eedf6080
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_arm.deb
Size/MD5 checksum: 5358320 f7c4ea8a35083db8e461bad0b70906fa
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_arm.deb
Size/MD5 checksum: 316126 68b0666de2045a8574f7d50919883858
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_arm.deb
Size/MD5 checksum: 1490918 46ae049e5cb0539870f305e4868e2e42
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_armel.deb
Size/MD5 checksum: 5383624 73ae62f4b416c5ebfc792231c66f8ca1
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_armel.deb
Size/MD5 checksum: 319456 546b24abfb2c38aa2572ba90c48bc095
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_armel.deb
Size/MD5 checksum: 667564 a30c4906f3ad9ca042741c122b99cf31
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_armel.deb
Size/MD5 checksum: 1494952 a51898e2f3766423dbe6b584769b6db0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_hppa.deb
Size/MD5 checksum: 753668 f70ef43544c55771852789bec4bf94e0
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_hppa.deb
Size/MD5 checksum: 5489574 64a4227ef892258851004c21841b94e6
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_hppa.deb
Size/MD5 checksum: 361010 52121ede100f605ea53423fff2d7300a
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_hppa.deb
Size/MD5 checksum: 1827456 aacc5b3a8fadc0d4576e7a191c457e68
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_i386.deb
Size/MD5 checksum: 1584030 b7241b147ae106b236b3c19860b3fd04
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_i386.deb
Size/MD5 checksum: 680872 399492517586fb1277892bd3fb3bf7b5
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_i386.deb
Size/MD5 checksum: 5374090 0408715682fda4b1fcb1945e7d6770ee
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_i386.deb
Size/MD5 checksum: 326552 eba36a04da368b35f858a88f1034469c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_ia64.deb
Size/MD5 checksum: 948018 def22510f06bbb084d56b6c402a474cc
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_ia64.deb
Size/MD5 checksum: 2194234 8891d61cba33f2a9e434e7e12541a636
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_ia64.deb
Size/MD5 checksum: 434572 19b4d9631440cf2fe92abfd032ed8bfd
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_ia64.deb
Size/MD5 checksum: 5223568 d6e5076c460293e3265147b26434c1d8
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mips.deb
Size/MD5 checksum: 5655552 3939bde10319e1ed310d607f782e692e
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mips.deb
Size/MD5 checksum: 653818 5ba191b2eb2d299ab36f8f08a2261bf4
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mips.deb
Size/MD5 checksum: 318128 3e41d036421525584379abce4d893d17
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mips.deb
Size/MD5 checksum: 1373126 f4d12c42ad8577233f6f289e5ee27a49
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_mipsel.deb
Size/MD5 checksum: 318118 2f291b88715934b7ab36f6f551e5bb25
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_mipsel.deb
Size/MD5 checksum: 1358266 ca0716e2a4bcf3d6737913a6f13b03ab
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_mipsel.deb
Size/MD5 checksum: 650804 258c2a0b93d7714120346ec6037c79f2
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_mipsel.deb
Size/MD5 checksum: 5544090 ff48eadd054ae5c758920e8ca8f42df4
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_powerpc.deb
Size/MD5 checksum: 1760236 03b52ff4df575157cc21ed1b86e925af
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_powerpc.deb
Size/MD5 checksum: 362840 9f65e44425a193783f9f1201050a6be3
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_powerpc.deb
Size/MD5 checksum: 5578900 0e70281f616a1cd67d02c4a5e07c776f
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_powerpc.deb
Size/MD5 checksum: 753758 642d77cf4334d7c4aa8a84bb7d9699f8
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_s390.deb
Size/MD5 checksum: 717168 cd1cb86f77fe1e618d9672d28af70170
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_s390.deb
Size/MD5 checksum: 5566916 20978bccaccbc40cbc5d4724627f148c
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_s390.deb
Size/MD5 checksum: 358728 8bab5444b68d96d61ad17d4a06572828
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_s390.deb
Size/MD5 checksum: 1645716 c70783f5beacb8de41aecec6716f1a5a
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/p/pidgin/pidgin-dbg_2.4.3-4lenny2_sparc.deb
Size/MD5 checksum: 5138450 93d398c20768690981b72145004b55cb
http://security.debian.org/pool/updates/main/p/pidgin/pidgin_2.4.3-4lenny2_sparc.deb
Size/MD5 checksum: 682926 4487a4faeb57750c1b63a437caefee8c
http://security.debian.org/pool/updates/main/p/pidgin/libpurple0_2.4.3-4lenny2_sparc.deb
Size/MD5 checksum: 1587786 2d2a043944b81d6cbcedf092c9f6e005
http://security.debian.org/pool/updates/main/p/pidgin/finch_2.4.3-4lenny2_sparc.deb
Size/MD5 checksum: 327572 9dcaa99102693093ef770e24e748dd0c
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkoXBLsACgkQXm3vHE4uylqYhwCgpviMfpfRRdBhDQAq2FfRPxam
Ek4An0udvE+xSS9Lgk4pYBbBx0BhNUEp
=Ou7B
-----END PGP SIGNATURE-----
"
This entry was posted
on 3:40 PM
.
Archives
-
▼
2009
(488)
-
▼
June
(53)
- RHSA-2009:1127-01 Critical: kdelibs security update
- RHSA-2009:1128-01 Important: kdelibs security update
- USN-782-1: Thunderbird vulnerabilities
- RHSA-2009:1125-01 Moderate: thunderbird security u...
- RHSA-2009:1123-01 Moderate: gstreamer-plugins-good...
- USN-791-2: Moodle vulnerability
- RHSA-2009:1130-01 Critical: kdegraphics security u...
- RHSA-2009:1126-01 Moderate: thunderbird security u...
- DSA 1821-1: New amule packages fix insufficient in...
- RHSA-2009:1109-01 Critical: acroread security update
- DSA 1822-1: New mahara packages fix cross-site scr...
- DSA 1817-1: New ctorrent packages fix arbitrary co...
- RHSA-2009:1101-01 Moderate: cscope security update
- USN-788-1: Tomcat vulnerabilities
- DSA 1816-1: New apache2 packages fix privilege esc...
- RHSA-2009:1106-01 Important: kernel security and b...
- RHSA-2009:1102-01 Moderate: cscope security update
- DSA 1818-1: New gforge packages fix insufficient i...
- RHSA-2009:1100-01 Moderate: wireshark security update
- RHSA-2009:1107-01 Moderate: apr-util security update
- USN-775-2: Quagga regression
- DSA 1815-1: New libtorrent-rasterbar packages fix ...
- RHSA-2009:1096-01 Critical: seamonkey security update
- DSA 1814-1: New libsndfile packages fix arbitrary ...
- USN-784-1: ImageMagick vulnerability
- USN-785-1: ipsec-tools vulnerabilities
- RHSA-2009:1087-01 Important: mod_jk security update
- USN-783-1: eCryptfs vulnerability
- USN-781-1: Pidgin vulnerabilities
- RHSA-2009:1081-01 Important: kernel-rt security an...
- DSA 1809-1: New Linux 2.6.26 packages fix several ...
- RHSA-2009:1082-01 Important: cups security update
- USN-780-1: CUPS vulnerability
- USN-780-1: CUPS vulnerability
- DSA 1810-1: New cups/cupsys packages fix denial of...
- DSA 1812-1: New apr-util packages fix several vuln...
- RHSA-2009:1083-01 Important: cups security update
- USN-781-2: Gaim vulnerabilities
- RHSA-2009:1077-01 Important: kernel security and b...
- DSA 1810-1: New libapache-mod-jk packages fix info...
- USN-778-1: cron vulnerability
- RHSA-2009:1076-01 Low: Red Hat Enterprise Linux 2....
- DSA 1807-1: New cyrus-sasl2/cyrus-sasl2-heimdal pa...
- GLSA 200905-06 acpid: Denial of Service
- DSA 1805-1: New pidgin packages fix several vulner...
- GLSA 200905-08 NTP: Remote execution of arbitrary...
- GLSA 200905-07 Pidgin: Multiple vulnerabilities
- RHSA-2009:1067-01 Moderate: Red Hat Application St...
- RHSA-2009:1075-01 Moderate: httpd security update
- GLSA 200905-09 libsndfile: User-assisted executio...
- RHSA-2009:1066-01 Important: squirrelmail security...
- GLSA 200905-03 IPSec Tools: Denial of Service
- GLSA 200905-05 FreeType: Multiple vulnerabilities
-
▼
June
(53)