[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 3620-1] pidgin security update




Salvatore Bonaccorso <carnil@debian.org> schrieb:

>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA512
>
>- -------------------------------------------------------------------------
>Debian Security Advisory DSA-3620-1                   security@debian.org
>https://www.debian.org/security/                     Salvatore Bonaccorso
>July 15, 2016                         https://www.debian.org/security/faq
>- -------------------------------------------------------------------------
>
>Package        : pidgin
>CVE ID         : CVE-2016-2365 CVE-2016-2366 CVE-2016-2367 CVE-2016-2368
>                 CVE-2016-2369 CVE-2016-2370 CVE-2016-2371 CVE-2016-2372
>                 CVE-2016-2373 CVE-2016-2374 CVE-2016-2375 CVE-2016-2376
>                 CVE-2016-2377 CVE-2016-2378 CVE-2016-2380 CVE-2016-4323
>
>Yves Younan of Cisco Talos discovered several vulnerabilities in the
>MXit protocol support in pidgin, a multi-protocol instant messaging
>client. A remote attacker can take advantage of these flaws to cause a
>denial of service (application crash), overwrite files, information
>disclosure, or potentially to execute arbitrary code.
>
>For the stable distribution (jessie), these problems have been fixed in
>version 2.11.0-0+deb8u1.
>
>For the testing distribution (stretch), these problems have been fixed
>in version 2.11.0-1.
>
>For the unstable distribution (sid), these problems have been fixed in
>version 2.11.0-1.
>
>We recommend that you upgrade your pidgin packages.
>
>Further information about Debian Security Advisories, how to apply
>these updates to your system and frequently asked questions can be
>found at: https://www.debian.org/security/
>
>Mailing list: debian-security-announce@lists.debian.org
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1
>
>iQIcBAEBCgAGBQJXiTCbAAoJEAVMuPMTQ89E4nUP/jEpNVpOe4FcStlU24Cv1qOS
>BsNBvRlp1XhhshzoBAWZSBTKFi4jqilOZUgjsHO76nHS7j0J4wzoWc36ZIp23O5p
>KX9+A87ZdS4C3hI1YGgTdCcMTKSnWIrS1YcOW/0qBx7jdXt5EhFPKJa/byhHsp23
>zguJ+glemJQ9uqpylc5om2udV4u9U5Nnc+Ga92zeR7Kefs20yRTLOef4Pd69LPwh
>+zM0/qkI+JMii0yMpMJsIpMsXzQvzvgd4E6r3+NrWOHOCoZ8XZD4UvsR3Bnw8nvg
>ed+hg2nj3uMWgXtv4Bdx+yUxsWdRFSjpiD1EXWmvzREgmDdrlnCGZB3yQbepA0Yi
>lHsHEAwq3GZalLAeW8lwIQVaSLSREO6ZxcY7OxG2vdYzbkoQKCK7K4rR4T3yxB83
>tAvYWRxCTMaeRxqUgLEAq0iMqQhvrmNDDEt5VVsE1bSn9gig6MkSGepFdzx4Yipq
>+a8XUgJt8tLbpuTD9Pg9Ig8Mee0SaHSxr8bP6fFlfJu0Wt59MKn3wNzcqPhb+3Ie
>FtLyo6XBC4hnsoVlRT569fwkuYaI/kptT95tKiqyYI+RFnSW0WP4dycmo2pHOuIP
>mckCbAM7s+vuCGe1YQHJiOCeTrIDKAkKPbudjBL/g2zbcY+KayMXTvZbbW+ma8c0
>wMiDOiIYUd4xMSvjBeF0
>=QNWs
>-----END PGP SIGNATURE-----
>

Reply to: