[SECURITY] [DLA 542-1] pidgin security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : pidgin
Version : 2.10.10-1~deb7u2
CVE ID : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323
Numerous security issues have been identified and fixed in Pidgin in
Debian/Wheezy.
CVE-2016-2365
MXIT Markup Command Denial of Service Vulnerability
CVE-2016-2366
MXIT Table Command Denial of Service Vulnerability
CVE-2016-2367
MXIT Avatar Length Memory Disclosure Vulnerability
CVE-2016-2368
MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities
CVE-2016-2369
MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability
CVE-2016-2370
MXIT Custom Resource Denial of Service Vulnerability
CVE-2016-2371
MXIT Extended Profiles Code Execution Vulnerability
CVE-2016-2372
MXIT File Transfer Length Memory Disclosure Vulnerability
CVE-2016-2373
MXIT Contact Mood Denial of Service Vulnerability
CVE-2016-2374
MXIT MultiMX Message Code Execution Vulnerability
CVE-2016-2375
MXIT Suggested Contacts Memory Disclosure Vulnerability
CVE-2016-2376
MXIT read stage 0x3 Code Execution Vulnerability
CVE-2016-2377
MXIT HTTP Content-Length Buffer Overflow Vulnerability
CVE-2016-2378
MXIT get_utf8_string Code Execution Vulnerability
CVE-2016-2380
MXIT mxit_convert_markup_tx Information Leak Vulnerability
CVE-2016-4323
MXIT Splash Image Arbitrary File Overwrite Vulnerability
For Debian 7 "Wheezy", these problems have been fixed in version
2.10.10-1~deb7u2.
We recommend that you upgrade your pidgin packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- --
Brian May <bam@debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=S23F
-----END PGP SIGNATURE-----
Reply to: