Mailinglist Archive: opensuse-updates (114 mails)

< Previous Next >
openSUSE-SU-2014:1397-1: moderate: update for pidgin
openSUSE Security Update: update for pidgin
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:1397-1
Rating: moderate
References: #853038 #874606 #902408 #902409 #902410 #902495

Cross-References: CVE-2014-3694 CVE-2014-3695 CVE-2014-3696
CVE-2014-3697 CVE-2014-3698
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that solves 5 vulnerabilities and has one errata
is now available.

Description:


- Update to version 2.10.10:
+ General:
- Check the basic constraints extension when validating SSL/TLS
certificates. This fixes a security hole that allowed a malicious
man-in-the-middle to impersonate an IM server or any other https
endpoint. This affected both the NSS and GnuTLS plugins
(CVE-2014-3694, boo#902495).
- Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin for SSL
(im#15909).
+ libpurple3 compatibility:
- Encrypted account passwords are preserved until the new one is set.
- Fix loading Google Talk and Facebook XMPP accounts.
+ Windows-Specific Changes: Don't allow overwriting arbitrary files on
the file system when the user installs a smiley theme via
drag-and-drop (CVE-2014-3697).
+ Finch: Fix build against Python 3 (im#15969).
+ Gadu-Gadu: Updated internal libgadu to version 1.12.0.
+ Groupwise: Fix potential remote crash parsing server message that
indicates that a large amount of memory should be allocated
(CVE-2014-3696, boo#902410).
+ IRC: Fix a possible leak of unencrypted data when using /me command
with OTR (im#15750).
+ MXit: Fix potential remote crash parsing a malformed emoticon response
(CVE-2014-3695, boo#902409).
+ XMPP:
- Fix potential information leak where a malicious XMPP server and
possibly even a malicious remote user could create a carefully
crafted XMPP message that causes libpurple to send an XMPP message
containing arbitrary memory (CVE-2014-3698, boo#902408).
- Fix Facebook XMPP roster quirks (im#15041, im#15957).
+ Yahoo: Fix login when using the GnuTLS library for TLS connections
(im#16172, boo#874606).
- Drop pidgin-gstreamer1.patch: causes crashes and Video still does not
work (boo#853038). Drop BuildRequires conditions switching to GStreamer
1.0.
- Rebase pidgin-crash-missing-gst-registry.patch.

+ add pidgin-crash-missing-gst-registry.patch according to the GST doc,
"gst_init" should be called before any other calls.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2014-648

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

finch-2.10.10-5.4.1
finch-debuginfo-2.10.10-5.4.1
finch-devel-2.10.10-5.4.1
libpurple-2.10.10-5.4.1
libpurple-debuginfo-2.10.10-5.4.1
libpurple-devel-2.10.10-5.4.1
libpurple-meanwhile-2.10.10-5.4.1
libpurple-meanwhile-debuginfo-2.10.10-5.4.1
libpurple-tcl-2.10.10-5.4.1
libpurple-tcl-debuginfo-2.10.10-5.4.1
pidgin-2.10.10-5.4.1
pidgin-debuginfo-2.10.10-5.4.1
pidgin-debugsource-2.10.10-5.4.1
pidgin-devel-2.10.10-5.4.1

- openSUSE 13.2 (noarch):

libpurple-branding-openSUSE-13.2-2.3.1
libpurple-branding-upstream-2.10.10-5.4.1
libpurple-lang-2.10.10-5.4.1


References:

http://support.novell.com/security/cve/CVE-2014-3694.html
http://support.novell.com/security/cve/CVE-2014-3695.html
http://support.novell.com/security/cve/CVE-2014-3696.html
http://support.novell.com/security/cve/CVE-2014-3697.html
http://support.novell.com/security/cve/CVE-2014-3698.html
https://bugzilla.suse.com/show_bug.cgi?id=853038
https://bugzilla.suse.com/show_bug.cgi?id=874606
https://bugzilla.suse.com/show_bug.cgi?id=902408
https://bugzilla.suse.com/show_bug.cgi?id=902409
https://bugzilla.suse.com/show_bug.cgi?id=902410
https://bugzilla.suse.com/show_bug.cgi?id=902495


< Previous Next >
This Thread
  • No further messages