"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: pidgin security update
Advisory ID: RHSA-2009:1218-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1218.html
Issue date: 2009-08-18
CVE Names: CVE-2009-2694
=====================================================================
1. Summary:
Updated pidgin packages that fix a security issue are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64
3. Description:
Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.
Federico Muttis of Core Security Technologies discovered a flaw in Pidgin's
MSN protocol handler. If a user received a malicious MSN message, it was
possible to execute arbitrary code with the permissions of the user running
Pidgin. (CVE-2009-2694)
Note: Users can change their privacy settings to only allow messages from
users on their buddy list to limit the impact of this flaw.
These packages upgrade Pidgin to version 2.5.9. Refer to the Pidgin release
notes for a full list of changes: http://developer.pidgin.im/wiki/ChangeLog
All Pidgin users should upgrade to these updated packages, which resolve
this issue. Pidgin must be restarted for this update to take effect.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
514957 - CVE-2009-2694 pidgin: insufficient input validation in msn_slplink_process_msg()
6. Package List:
Red Hat Enterprise Linux AS version 3:
Source:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/pidgin-1.5.1-4.el3.src.rpm
i386:
pidgin-1.5.1-4.el3.i386.rpm
pidgin-debuginfo-1.5.1-4.el3.i386.rpm
ia64:
pidgin-1.5.1-4.el3.ia64.rpm
pidgin-debuginfo-1.5.1-4.el3.ia64.rpm
ppc:
pidgin-1.5.1-4.el3.ppc.rpm
pidgin-debuginfo-1.5.1-4.el3.ppc.rpm
s390:
pidgin-1.5.1-4.el3.s390.rpm
pidgin-debuginfo-1.5.1-4.el3.s390.rpm
s390x:
pidgin-1.5.1-4.el3.s390x.rpm
pidgin-debuginfo-1.5.1-4.el3.s390x.rpm
x86_64:
pidgin-1.5.1-4.el3.x86_64.rpm
pidgin-debuginfo-1.5.1-4.el3.x86_64.rpm
Red Hat Desktop version 3:
Source:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/pidgin-1.5.1-4.el3.src.rpm
i386:
pidgin-1.5.1-4.el3.i386.rpm
pidgin-debuginfo-1.5.1-4.el3.i386.rpm
x86_64:
pidgin-1.5.1-4.el3.x86_64.rpm
pidgin-debuginfo-1.5.1-4.el3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
Source:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/pidgin-1.5.1-4.el3.src.rpm
i386:
pidgin-1.5.1-4.el3.i386.rpm
pidgin-debuginfo-1.5.1-4.el3.i386.rpm
ia64:
pidgin-1.5.1-4.el3.ia64.rpm
pidgin-debuginfo-1.5.1-4.el3.ia64.rpm
x86_64:
pidgin-1.5.1-4.el3.x86_64.rpm
pidgin-debuginfo-1.5.1-4.el3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
Source:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/pidgin-1.5.1-4.el3.src.rpm
i386:
pidgin-1.5.1-4.el3.i386.rpm
pidgin-debuginfo-1.5.1-4.el3.i386.rpm
ia64:
pidgin-1.5.1-4.el3.ia64.rpm
pidgin-debuginfo-1.5.1-4.el3.ia64.rpm
x86_64:
pidgin-1.5.1-4.el3.x86_64.rpm
pidgin-debuginfo-1.5.1-4.el3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/pidgin-2.5.9-1.el4.src.rpm
i386:
finch-2.5.9-1.el4.i386.rpm
finch-devel-2.5.9-1.el4.i386.rpm
libpurple-2.5.9-1.el4.i386.rpm
libpurple-devel-2.5.9-1.el4.i386.rpm
libpurple-perl-2.5.9-1.el4.i386.rpm
libpurple-tcl-2.5.9-1.el4.i386.rpm
pidgin-2.5.9-1.el4.i386.rpm
pidgin-debuginfo-2.5.9-1.el4.i386.rpm
pidgin-devel-2.5.9-1.el4.i386.rpm
pidgin-perl-2.5.9-1.el4.i386.rpm
ia64:
finch-2.5.9-1.el4.ia64.rpm
finch-devel-2.5.9-1.el4.ia64.rpm
libpurple-2.5.9-1.el4.ia64.rpm
libpurple-devel-2.5.9-1.el4.ia64.rpm
libpurple-perl-2.5.9-1.el4.ia64.rpm
libpurple-tcl-2.5.9-1.el4.ia64.rpm
pidgin-2.5.9-1.el4.ia64.rpm
pidgin-debuginfo-2.5.9-1.el4.ia64.rpm
pidgin-devel-2.5.9-1.el4.ia64.rpm
pidgin-perl-2.5.9-1.el4.ia64.rpm
ppc:
finch-2.5.9-1.el4.ppc.rpm
finch-devel-2.5.9-1.el4.ppc.rpm
libpurple-2.5.9-1.el4.ppc.rpm
libpurple-devel-2.5.9-1.el4.ppc.rpm
libpurple-perl-2.5.9-1.el4.ppc.rpm
libpurple-tcl-2.5.9-1.el4.ppc.rpm
pidgin-2.5.9-1.el4.ppc.rpm
pidgin-debuginfo-2.5.9-1.el4.ppc.rpm
pidgin-devel-2.5.9-1.el4.ppc.rpm
pidgin-perl-2.5.9-1.el4.ppc.rpm
x86_64:
finch-2.5.9-1.el4.x86_64.rpm
finch-devel-2.5.9-1.el4.x86_64.rpm
libpurple-2.5.9-1.el4.x86_64.rpm
libpurple-devel-2.5.9-1.el4.x86_64.rpm
libpurple-perl-2.5.9-1.el4.x86_64.rpm
libpurple-tcl-2.5.9-1.el4.x86_64.rpm
pidgin-2.5.9-1.el4.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el4.x86_64.rpm
pidgin-devel-2.5.9-1.el4.x86_64.rpm
pidgin-perl-2.5.9-1.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/pidgin-2.5.9-1.el4.src.rpm
i386:
finch-2.5.9-1.el4.i386.rpm
finch-devel-2.5.9-1.el4.i386.rpm
libpurple-2.5.9-1.el4.i386.rpm
libpurple-devel-2.5.9-1.el4.i386.rpm
libpurple-perl-2.5.9-1.el4.i386.rpm
libpurple-tcl-2.5.9-1.el4.i386.rpm
pidgin-2.5.9-1.el4.i386.rpm
pidgin-debuginfo-2.5.9-1.el4.i386.rpm
pidgin-devel-2.5.9-1.el4.i386.rpm
pidgin-perl-2.5.9-1.el4.i386.rpm
x86_64:
finch-2.5.9-1.el4.x86_64.rpm
finch-devel-2.5.9-1.el4.x86_64.rpm
libpurple-2.5.9-1.el4.x86_64.rpm
libpurple-devel-2.5.9-1.el4.x86_64.rpm
libpurple-perl-2.5.9-1.el4.x86_64.rpm
libpurple-tcl-2.5.9-1.el4.x86_64.rpm
pidgin-2.5.9-1.el4.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el4.x86_64.rpm
pidgin-devel-2.5.9-1.el4.x86_64.rpm
pidgin-perl-2.5.9-1.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/pidgin-2.5.9-1.el4.src.rpm
i386:
finch-2.5.9-1.el4.i386.rpm
finch-devel-2.5.9-1.el4.i386.rpm
libpurple-2.5.9-1.el4.i386.rpm
libpurple-devel-2.5.9-1.el4.i386.rpm
libpurple-perl-2.5.9-1.el4.i386.rpm
libpurple-tcl-2.5.9-1.el4.i386.rpm
pidgin-2.5.9-1.el4.i386.rpm
pidgin-debuginfo-2.5.9-1.el4.i386.rpm
pidgin-devel-2.5.9-1.el4.i386.rpm
pidgin-perl-2.5.9-1.el4.i386.rpm
ia64:
finch-2.5.9-1.el4.ia64.rpm
finch-devel-2.5.9-1.el4.ia64.rpm
libpurple-2.5.9-1.el4.ia64.rpm
libpurple-devel-2.5.9-1.el4.ia64.rpm
libpurple-perl-2.5.9-1.el4.ia64.rpm
libpurple-tcl-2.5.9-1.el4.ia64.rpm
pidgin-2.5.9-1.el4.ia64.rpm
pidgin-debuginfo-2.5.9-1.el4.ia64.rpm
pidgin-devel-2.5.9-1.el4.ia64.rpm
pidgin-perl-2.5.9-1.el4.ia64.rpm
x86_64:
finch-2.5.9-1.el4.x86_64.rpm
finch-devel-2.5.9-1.el4.x86_64.rpm
libpurple-2.5.9-1.el4.x86_64.rpm
libpurple-devel-2.5.9-1.el4.x86_64.rpm
libpurple-perl-2.5.9-1.el4.x86_64.rpm
libpurple-tcl-2.5.9-1.el4.x86_64.rpm
pidgin-2.5.9-1.el4.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el4.x86_64.rpm
pidgin-devel-2.5.9-1.el4.x86_64.rpm
pidgin-perl-2.5.9-1.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/pidgin-2.5.9-1.el4.src.rpm
i386:
finch-2.5.9-1.el4.i386.rpm
finch-devel-2.5.9-1.el4.i386.rpm
libpurple-2.5.9-1.el4.i386.rpm
libpurple-devel-2.5.9-1.el4.i386.rpm
libpurple-perl-2.5.9-1.el4.i386.rpm
libpurple-tcl-2.5.9-1.el4.i386.rpm
pidgin-2.5.9-1.el4.i386.rpm
pidgin-debuginfo-2.5.9-1.el4.i386.rpm
pidgin-devel-2.5.9-1.el4.i386.rpm
pidgin-perl-2.5.9-1.el4.i386.rpm
ia64:
finch-2.5.9-1.el4.ia64.rpm
finch-devel-2.5.9-1.el4.ia64.rpm
libpurple-2.5.9-1.el4.ia64.rpm
libpurple-devel-2.5.9-1.el4.ia64.rpm
libpurple-perl-2.5.9-1.el4.ia64.rpm
libpurple-tcl-2.5.9-1.el4.ia64.rpm
pidgin-2.5.9-1.el4.ia64.rpm
pidgin-debuginfo-2.5.9-1.el4.ia64.rpm
pidgin-devel-2.5.9-1.el4.ia64.rpm
pidgin-perl-2.5.9-1.el4.ia64.rpm
x86_64:
finch-2.5.9-1.el4.x86_64.rpm
finch-devel-2.5.9-1.el4.x86_64.rpm
libpurple-2.5.9-1.el4.x86_64.rpm
libpurple-devel-2.5.9-1.el4.x86_64.rpm
libpurple-perl-2.5.9-1.el4.x86_64.rpm
libpurple-tcl-2.5.9-1.el4.x86_64.rpm
pidgin-2.5.9-1.el4.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el4.x86_64.rpm
pidgin-devel-2.5.9-1.el4.x86_64.rpm
pidgin-perl-2.5.9-1.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.5.9-1.el5.src.rpm
i386:
finch-2.5.9-1.el5.i386.rpm
libpurple-2.5.9-1.el5.i386.rpm
libpurple-perl-2.5.9-1.el5.i386.rpm
libpurple-tcl-2.5.9-1.el5.i386.rpm
pidgin-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-perl-2.5.9-1.el5.i386.rpm
x86_64:
finch-2.5.9-1.el5.i386.rpm
finch-2.5.9-1.el5.x86_64.rpm
libpurple-2.5.9-1.el5.i386.rpm
libpurple-2.5.9-1.el5.x86_64.rpm
libpurple-perl-2.5.9-1.el5.x86_64.rpm
libpurple-tcl-2.5.9-1.el5.x86_64.rpm
pidgin-2.5.9-1.el5.i386.rpm
pidgin-2.5.9-1.el5.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.x86_64.rpm
pidgin-perl-2.5.9-1.el5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.5.9-1.el5.src.rpm
i386:
finch-devel-2.5.9-1.el5.i386.rpm
libpurple-devel-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-devel-2.5.9-1.el5.i386.rpm
x86_64:
finch-devel-2.5.9-1.el5.i386.rpm
finch-devel-2.5.9-1.el5.x86_64.rpm
libpurple-devel-2.5.9-1.el5.i386.rpm
libpurple-devel-2.5.9-1.el5.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.x86_64.rpm
pidgin-devel-2.5.9-1.el5.i386.rpm
pidgin-devel-2.5.9-1.el5.x86_64.rpm
RHEL Optional Productivity Applications (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/pidgin-2.5.9-1.el5.src.rpm
i386:
finch-2.5.9-1.el5.i386.rpm
finch-devel-2.5.9-1.el5.i386.rpm
libpurple-2.5.9-1.el5.i386.rpm
libpurple-devel-2.5.9-1.el5.i386.rpm
libpurple-perl-2.5.9-1.el5.i386.rpm
libpurple-tcl-2.5.9-1.el5.i386.rpm
pidgin-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-devel-2.5.9-1.el5.i386.rpm
pidgin-perl-2.5.9-1.el5.i386.rpm
x86_64:
finch-2.5.9-1.el5.i386.rpm
finch-2.5.9-1.el5.x86_64.rpm
finch-devel-2.5.9-1.el5.i386.rpm
finch-devel-2.5.9-1.el5.x86_64.rpm
libpurple-2.5.9-1.el5.i386.rpm
libpurple-2.5.9-1.el5.x86_64.rpm
libpurple-devel-2.5.9-1.el5.i386.rpm
libpurple-devel-2.5.9-1.el5.x86_64.rpm
libpurple-perl-2.5.9-1.el5.x86_64.rpm
libpurple-tcl-2.5.9-1.el5.x86_64.rpm
pidgin-2.5.9-1.el5.i386.rpm
pidgin-2.5.9-1.el5.x86_64.rpm
pidgin-debuginfo-2.5.9-1.el5.i386.rpm
pidgin-debuginfo-2.5.9-1.el5.x86_64.rpm
pidgin-devel-2.5.9-1.el5.i386.rpm
pidgin-devel-2.5.9-1.el5.x86_64.rpm
pidgin-perl-2.5.9-1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694
http://www.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFKivQeXlSAg2UNWIIRAk4nAKCJJMyUGdcpxZxqxm5DdcahlfURRACfXP9R
WHSycqMw3T9WFH1QryidqTQ=
=/4nR
-----END PGP SIGNATURE-----
"
RHSA-2009:1209-01 Moderate: curl security update
This entry was posted
on 3:37 PM
.
Archives
-
▼
2009
(488)
-
▼
August
(32)
- DSA 1875-1: New ikiwiki packages fix information d...
- USN-822-1: KDE-Libs vulnerabilities
- RHSA-2009:1236-01 Critical: java-1.5.0-ibm securit...
- RHSA-2009:1233-01 Important: kernel security update
- USN-825-1: libvorbis vulnerability
- DSA 1874-1: New nss packages fix several vulnerabi...
- DSA 1873-1: New xulrunner packages fix spoofing vu...
- DSA 1871-2: New wordpress packages fix regression
- DSA 1833-2: New dhcp3 packages fix arbitrary code ...
- DSA 1872-1: New Linux 2.6.18 packages fix several ...
- USN-823-1: KDE-Graphics vulnerabilities
- RHSA-2009:1223-02 Important: kernel security update
- RHSA-2009:1222-02 Important: kernel security and b...
- DSA 1871-1: New wordpress packages fix several vul...
- DSA 1867-1: New kdelibs packages fix several vulne...
- GLSA 200908-09 DokuWiki: Local file inclusion
- USN-817-1: Thunderbird vulnerabilities
- USN-809-1: GnuTLS vulnerabilities
- GLSA 200908-08 ISC DHCP: dhcpd Denial of Service
- USN-818-1: curl vulnerability
- GLSA 200908-10 Dillo: User-assisted execution of ...
- RHSA-2009:1218-01 Critical: pidgin security update
- DSA 1865-1: New Linux 2.6.18 packages fix several ...
- DSA 1863-1: New zope2.10/zope2.9 packages fix arbi...
- RHSA-2009:1207-01 Critical: nspr and nss security ...
- USN-815-1: libxml2 vulnerabilities
- DSA 1862-1: New Linux 2.6.26 packages fix privileg...
- RHSA-2009:1209-01 Moderate: curl security update
- USN-816-1: fetchmail vulnerability
- DSA 1857-1: New camlimages packages fix arbitrary ...
- DSA 1856-1: New mantis packages fix information leak
- DSA 1854-1: New APR packages fix arbitrary code ex...
-
▼
August
(32)