Change logs for pidgin source package in Saucy

  • pidgin (1:2.10.7-0ubuntu4.1.13.10.2) saucy-security; urgency=medium
    
      * SECURITY UPDATE: memory corruption via crafted message from gadu-gadu
        file relay server
        - debian/patches/CVE-2014-3775.patch: check relay_count in
          libpurple/protocols/gg/lib/dcc7.c
        - CVE-2014-3775
     -- Marc Deslauriers <email address hidden>   Tue, 20 May 2014 11:09:56 -0400
  • pidgin (1:2.10.7-0ubuntu4.1.13.10.1) saucy-security; urgency=medium
    
      * SECURITY UPDATE: remote crash in yahoo via incorrect char encoding
        - debian/patches/CVE-2012-6152.patch: validate strings as utf-8
          before parsing in libpurple/protocols/yahoo/{libymsg,yahoo_aliases,
          yahoo_filexfer,yahoo_friend,yahoo_picture,yahoochat}.c.
        - CVE-2012-6152
      * SECURITY UPDATE: crash via bad XMPP timestamp
        - debian/patches/CVE-2013-6477.patch: properly handle invalid
          timestamps in libpurple/{conversation,log,server}.c.
        - CVE-2013-6477
      * SECURITY UPDATE: crash via hovering pointer over long URL
        - debian/patches/CVE-2013-6478.patch: set max lengths in
          pidgin/gtkimhtml.c.
        - CVE-2013-6478
      * SECURITY UPDATE: remote crash via HTTP response parsing
        - debian/patches/CVE-2013-6479.patch: don't implicitly trust
          Content-Length in libpurple/util.c.
        - CVE-2013-6479
      * SECURITY UPDATE: remote crash via yahoo P2P message
        - debian/patches/CVE-2013-6481.patch: perform bounds checking in
          libpurple/protocols/yahoo/libymsg.c.
        - CVE-2013-6481
      * SECURITY UPDATE: crashes via MSN NULL pointer dereferences
        - debian/patches/CVE-2013-6482.patch: fix NULL pointers in
          libpurple/protocols/msn/{msg,oim,soap}.c.
        - CVE-2013-6482
      * SECURITY UPDATE: iq reply spoofing via incorrect from verification
        - debian/patches/CVE-2013-6483.patch: verify from field on iq replies
          in libpurple/protocols/jabber/{iq.*,jabber.c,jutil.*}.
        - CVE-2013-6483
      * SECURITY UPDATE: crash via response from STUN server
        - debian/patches/CVE-2013-6484.patch: validate len in libpurple/stun.c.
        - CVE-2013-6484
      * SECURITY UPDATE: buffer overflow in chunked HTTP response parsing
        - debian/patches/CVE-2013-6485.patch: limit chunk size in
          libpurple/util.c.
        - CVE-2013-6485
      * SECURITY UPDATE: buffer overflow in gadu-gadu HTTP parsing
        - debian/patches/CVE-2013-6487.patch: limit length in
          libpurple/protocols/gg/lib/http.c.
        - CVE-2013-6487
      * SECURITY UPDATE: buffer overflow in MXit emoticon parsing
        - debian/patches/CVE-2013-6489.patch: check return code in
          libpurple/protocols/mxit/markup.c.
        - CVE-2013-6489
      * SECURITY UPDATE: buffer overflow in SIMPLE header parsing
        - debian/patches/CVE-2013-6490.patch: use g_new in
          libpurple/protocols/simple/simple.c and check length in
          libpurple/protocols/simple/sipmsg.c.
        - CVE-2013-6490
      * SECURITY UPDATE: crash via IRC argument parsing
        - debian/patches/CVE-2014-0020.patch: fix arg handling in
          libpurple/protocols/irc/msgs.c, fix counts in
          libpurple/protocols/irc/parse.c.
        - CVE-2014-0020
     -- Marc Deslauriers <email address hidden>   Wed, 05 Feb 2014 15:08:01 -0500
  • pidgin (1:2.10.7-0ubuntu4.1) raring-proposed; urgency=low
    
      * Add hg-remove-SIGCHLD-handler.patch: Fix hanging on startup.
        Backport of upstream commit from 3.0 (LP: #1108056)
     -- Robert Hooker <email address hidden>   Sat, 20 Apr 2013 15:40:16 -0400