Slackware Security Announcement 2009-290-02: pidgin

Article Source Slackware Security Announcements

[slackware-security] pidgin (SSA:2009-290-02)

New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0,

and -current to fix a security issue.

More details about this issue may be found in the Common

Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615

Here are the details from the Slackware 13.0 ChangeLog:

+————————–+

patches/packages/pidgin-2.6.3-i486-1_slack13.0.txz:

This update fixes an issue where a remote user can cause libpurple-based

clients to crash.

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615

(* Security fix *)

+————————–+

Where to find the new packages:

+—————————–+

HINT: Getting slow download speeds from ftp.slackware.com?

Give slackware.osuosl.org a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating additional FTP and rsync hosting

to the Slackware project! 🙂

Also see the “Get Slack” section on http://slackware.com for

additional mirror sites near you.

Updated package for Slackware 12.0:

ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/pidgin-2.6.3-i486-1_slack12.0.tgz

Updated package for Slackware 12.1:

ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/pidgin-2.6.3-i486-1_slack12.1.tgz

Updated package for Slackware 12.2:

ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/pidgin-2.6.3-i486-1_slack12.2.tgz

Updated package for Slackware 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/pidgin-2.6.3-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/pidgin-2.6.3-x86_64-1_slack13.0.txz

Updated package for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/pidgin-2.6.3-i486-1.txz

Updated package for Slackware x86_64 -current:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/pidgin-2.6.3-x86_64-1.txz

MD5 signatures:

+————-+

Slackware 12.0 package:

2ebd4a84902d4818abf41ab8bbab51a2 pidgin-2.6.3-i486-1_slack12.0.tgz

Slackware 12.1 package:

defa9ff74babdc19b387bfbb3484390b pidgin-2.6.3-i486-1_slack12.1.tgz

Slackware 12.2 package:

a607298ba37e4c36209cc0f0c0746503 pidgin-2.6.3-i486-1_slack12.2.tgz

Slackware 13.0 package:

7680b89972f3746f95f3e89721bc5456 pidgin-2.6.3-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:

5b601d403720ca39836e27b13a3eb4aa pidgin-2.6.3-x86_64-1_slack13.0.txz

Slackware -current package:

fe3e8eb2bb9cf6628f89a339e24b1f61 pidgin-2.6.3-i486-1.txz

Slackware x86_64 -current package:

9ff24734eafd69437d240154c5e5d8fb pidgin-2.6.3-x86_64-1.txz

Installation instructions:

+————————+

Upgrade the package as root:

# upgradepkg pidgin-2.6.3-i486-1_slack13.0.txz

+—–+

Slackware Linux Security Team

http://slackware.com/gpg-key

This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Article Source Slackware Security Announcements [slackware-security] pidgin (SSA:2009-290-02) New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615 Here are the details from the Slackware 13.0…

Article Source Slackware Security Announcements [slackware-security] pidgin (SSA:2009-290-02) New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615 Here are the details from the Slackware 13.0…

Leave a Reply

Your email address will not be published. Required fields are marked *