Bug 20442 - pidgin new security issue CVE-2017-2640
: pidgin new security issue CVE-2017-2640
Status: NEW
Product: Mageia
Classification: Unclassified
Component: Security
: 5
: All Linux
: Normal Severity: normal
: ---
Assigned To: QA Team
: Sec team
:
: advisory
:
:
:
  Show dependency treegraph
 
Reported: 2017-03-10 12:11 CET by David Walser
Modified: 2017-03-16 20:20 CET (History)
2 users (show)

See Also:
Source RPM: pidgin-2.11.0-1.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2017-03-10 12:11:17 CET
Pidgin 2.12.0 has been released on March 9, fixing a security issue:
https://bitbucket.org/pidgin/www/src/tip/htdocs/ChangeLog?fileviewer=file-view-default

It also fixed Freenode IRC authentication and a certificate validation error with Google that causes some users to not be able to connect (and others to not be able to stay connected).

Protocols for dead services have been removed, and some for upstream protocols that changed have been moved to third-party plugins.  It would be nice if we could package the new Yahoo! plugin.
Comment 1 Shlomi Fish 2017-03-10 19:24:42 CET
The package in Cauldron/v6 was already updated and I submitted an update to mga5 core/updates_testing.
Comment 2 David Walser 2017-03-11 17:12:55 CET
Thanks!  Any chance we can get that Yahoo! plugin packaged?

Advisory:
========================

Updated pidgin packages fix security vulnerability:

A server controlled by an attacker can send an invalid XML that can trigger an
out-of-bound memory access. This might lead to a crash or, in some extreme
cases, to remote code execution in the client-side (CVE-2017-2640).

The pidgin package has been updated to version 2.12.0, which fixes this issue
and other bugs, including certificate validation for the Google Talk protocol.
It also removes protocol plugins for services that are no longer available or
supported.  See the upstream ChangeLog for details.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640
http://pidgin.im/news/security/?id=109
https://bitbucket.org/pidgin/www/src/tip/htdocs/ChangeLog?fileviewer=file-view-default
https://www.debian.org/security/2017/dsa-3806
========================

Updated packages in core/updates_testing:
========================
pidgin-2.12.0-1.mga5
pidgin-plugins-2.12.0-1.mga5
pidgin-perl-2.12.0-1.mga5
pidgin-tcl-2.12.0-1.mga5
pidgin-silc-2.12.0-1.mga5
libpurple-devel-2.12.0-1.mga5
libpurple0-2.12.0-1.mga5
libfinch0-2.12.0-1.mga5
finch-2.12.0-1.mga5
pidgin-bonjour-2.12.0-1.mga5
pidgin-meanwhile-2.12.0-1.mga5
pidgin-client-2.12.0-1.mga5
pidgin-i18n-2.12.0-1.mga5

from pidgin-2.12.0-1.mga5.src.rpm

Note You need to log in before you can comment on or make changes to this bug.