Gerfried Fuchs uploaded new packages for pidgin which fixed the
following security problem:
CVE-2008-2957, Debian Bug #488632
The UPnP functionality in Pidgin 2.0.0, and possibly other versions,
allows remote attackers to trigger the download of arbitrary files and
cause a denial of service (memory or disk consumption) via a UDP
packet that specifies an arbitrary URL.
For the etch-backports distribution the problem has been fixed in
version 2.4.3-4~bpo40+1
For the lenny and sid distributions the problem has been fixed in
version 2.4.3-4.
If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions>
We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:
Package: *
Pin: release a=etch-backports
Pin-Priority: 200
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 5 | all | libpurple-dev | < 2.4.3-4 | libpurple-dev_2.4.3-4_all.deb |
Debian | 5 | all | libpurple0 | < 2.4.3-4 | libpurple0_2.4.3-4_all.deb |
Debian | 5 | all | pidgin-dev | < 2.4.3-4 | pidgin-dev_2.4.3-4_all.deb |
Debian | 5 | all | pidgin-dbg | < 2.4.3-4 | pidgin-dbg_2.4.3-4_all.deb |
Debian | 5 | all | libpurple-bin | < 2.4.3-4 | libpurple-bin_2.4.3-4_all.deb |
Debian | 5 | all | finch-dev | < 2.4.3-4 | finch-dev_2.4.3-4_all.deb |
Debian | 5 | all | finch | < 2.4.3-4 | finch_2.4.3-4_all.deb |
Debian | 5 | all | pidgin-data | < 2.4.3-4 | pidgin-data_2.4.3-4_all.deb |
Debian | 5 | all | pidgin | < 2.4.3-4 | pidgin_2.4.3-4_all.deb |