You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa pidgin

Sigurnosni nedostaci programskog paketa pidgin

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-14069
2014-11-01 00:33:01
——————————————————————————–

Name : pidgin
Product : Fedora 20
Version : 2.10.10
Release : 1.fc20
URL : http://pidgin.im/
Summary : A Gtk+ based multiprotocol instant messaging client
Description :
Pidgin allows you to talk to anyone using a variety of messaging
protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu,
ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and
Zephyr. These protocols are implemented using a modular, easy to
use design. To use a protocol, just add an account using the
account editor.

Pidgin supports many common features of other clients, as well as many
unique features, such as perl scripting, TCL scripting and C plugins.

Pidgin is not affiliated with or endorsed by America Online, Inc.,
Microsoft Corporation, Yahoo! Inc., or ICQ Inc.

——————————————————————————–
Update Information:

Update to 2.10.10
Security fix for CVE-2014-3694, CVE-2014-3695, CVE-2014-3696, CVE-2014-3698

——————————————————————————–
ChangeLog:

* Wed Oct 29 2014 Jan Synáček <jsynacek@redhat.com> – 2.10.10-1
– Update to 2.10.10, includes security fixes for CVE-2014-3694,
CVE-2014-3695, CVE-2014-3696, CVE-2014-3697 and CVE-2014-3698
* Mon Feb 3 2014 Dan Mashal <dan.mashal@fedoraproject.org> 2.10.9-1
– Update to 2.10.9
* Thu Sep 26 2013 Rex Dieter <rdieter@fedoraproject.org> 2.10.7-9
– add explicit avahi build deps
——————————————————————————–
References:

[ 1 ] Bug #1154908 – CVE-2014-3694 pidgin: SSL/TLS plug-ins failed to check Basic Constraints
https://bugzilla.redhat.com/show_bug.cgi?id=1154908
[ 2 ] Bug #1154909 – CVE-2014-3695 pidgin: crash in MXit protocol plug-in
https://bugzilla.redhat.com/show_bug.cgi?id=1154909
[ 3 ] Bug #1154910 – CVE-2014-3696 pidgin: denial of service parsing Groupwise server message
https://bugzilla.redhat.com/show_bug.cgi?id=1154910
[ 4 ] Bug #1154911 – CVE-2014-3698 pidgin: remote information leak via crafted XMPP message
https://bugzilla.redhat.com/show_bug.cgi?id=1154911
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update pidgin’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarijo Plepelic
Cert idNCERT-REF-2014-11-0008-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivosti programskog paketa kfreebsd-9

Otkriveno je nekoliko ranjivosti u programskom paketu kfreebsd-9 za Debian. Kfreebsd omogućuje korištenje FreeBSD jezgre u kombinaciji s GNU programima...

Close