MGASA-2014-0295

Source
https://advisories.mageia.org/MGASA-2014-0295.html
Import Source
https://advisories.mageia.org/MGASA-2014-0295.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0295
Related
Published
2014-07-26T11:56:37Z
Modified
2014-07-26T11:56:15Z
Summary
Updated pidgin packages fix CVE-2014-3775
Details

Updated pidgin packages fix security vulnerability:

It was discovered that libgadu incorrectly handled certain messages from file relay servers. A malicious remote server or a man in the middle could use this issue to cause applications using libgadu to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2014-3775).

The pidgin package was built with a bundled copy of the libgadu library which contained the vulnerable code. It has now been built against the external libgadu library, which had been fixed in a previous update.

This update also fixes an issue with the Yahoo! protocol that was caused by a bad interaction with the GnuTLS library.

References
Credits

Affected packages

Mageia:3 / pidgin

Package

Name
pidgin
Purl
pkg:rpm/mageia/pidgin?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.9-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / pidgin

Package

Name
pidgin
Purl
pkg:rpm/mageia/pidgin?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.9-1.1.mga4

Ecosystem specific

{
    "section": "core"
}