Launchpad has imported 12 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=837319.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
** Changed in: gentoo
Status: Unknown = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) pidgin-2.10.5: MXit buffer overflow
To manage notifications
** Changed in: pidgin
Status: Unknown = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) pidgin-2.10.5: MXit buffer overflow
To manage notifications
** Changed in: gentoo
Importance: Medium = High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) pidgin-2.10.5: MXit buffer overflow
To manage notifications about
Thanks for your input, Tyler. My colleagues and I came to the same
cnclusion yesterday when we read the CERT messages and digged a bit
deeper regarding the MXit protocol. We run several different versions of
Pidgin from 2.4.1 to 2.10.6. Fortunately none of the packages was
shipped with a MXit
If you don't have an MXit account configured in Pidgin, you should be
fine. If you do have one configured, you're likely vulnerable while
logged into the account. The only recommended solution for users of the
MXit protocol is to upgrade Pidgin.
--
You received this bug notification because you
Is there currently a workaround for this flaw? Upgrade on my site was
delayed due to corporate procedures. Can I disable that MXit thing
somehow?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
** Bug watch added: Debian Bug tracker #680661
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661
** Also affects: pidgin via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680661
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a
This bug was fixed in the package pidgin - 1:2.10.3-0ubuntu1.1
---
pidgin (1:2.10.3-0ubuntu1.1) precise-security; urgency=low
* SECURITY UPDATE: Remote denial of service via specially crafted XMPP file
transfer requests (LP: #996691)
- debian/patches/CVE-2012-2214.patch:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: pidgin (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
Launchpad has imported 3 comments from the remote bug at
https://bugs.gentoo.org/show_bug.cgi?id=425076.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
11 matches
Mail list logo