** Changed in: gentoo
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to pidgin in Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) <pidgin-2.10.5: MXit buffer overflow
Status in Pidgin:
Fix Released
Status in “pidgin” package in Ubuntu:
Fix Released
Status in “pidgin” package in Fedora:
Unknown
Status in Gentoo Linux:
Fix Released
Bug description:
A new update, version 2.10.5, to the open source Pidgin instant messaging
program has been released, closing an important security hole. Previous
versions of Pidgin contained a vulnerability, discovered by Ulf Härnhammar, in
the MXit component, where parsing incoming messages with inline images led to a
buffer overflow.
The developers say that this could have been exploited by an attacker to
execute arbitrary code on a victim's system by using a specially crafted
message. Versions up to and including 2.10.4 are affected. Upgrading to Pidgin
2.10.5 fixes the problem; all users are advised to upgrade. Other bugs,
including an issue that caused the application to crash, have also been fixed.
http://www.pidgin.im/news/security/index.php?id=64
To manage notifications about this bug go to:
https://bugs.launchpad.net/pidgin/+bug/1022012/+subscriptions
--
Mailing list: https://launchpad.net/~desktop-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help : https://help.launchpad.net/ListHelp