---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Ubuntu update for pidgin SECUNIA ADVISORY ID: SA27858 VERIFY ADVISORY: http://secunia.com/advisories/27858/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 7.10 http://secunia.com/product/16251/ DESCRIPTION: Ubuntu has issued an update for pidgin. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA27372 SOLUTION: Apply updated packages. -- Ubuntu 7.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1.diff.gz Size/MD5:50647 96089eb50a7b671e85ae34579d261a13 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1.dsc Size/MD5: 1467 c8f381c53df16c7c48f37d1791456181 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1.orig.tar.gz Size/MD5: 12868326 3de2ef29d4a62c515a223cba5d4c4671 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/finch-dev_2.2.1-1ubuntu4.1_all.deb Size/MD5: 143250 2bd8553c5f54c1d801c2cba0033ecad3 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple-bin_2.2.1-1ubuntu4.1_all.deb Size/MD5: 123518 a6de723a4cac478c862eb0a3104934aa http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple-dev_2.2.1-1ubuntu4.1_all.deb Size/MD5: 257104 30c57242ae1fe458d4ec383289321045 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-data_2.2.1-1ubuntu4.1_all.deb Size/MD5:1390274 6cab724db2fd3ece0efcd96ee0af4337 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-dev_2.2.1-1ubuntu4.1_all.deb Size/MD5: 200036 e554277403d304d530540038162211d8 http://security.ubuntu.com/ubuntu/pool/universe/p/pidgin/gaim_2.2.1-1ubuntu4.1_all.deb Size/MD5: 118784 4f93e518b726f52c8b80de02ad1625d0 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/finch_2.2.1-1ubuntu4.1_amd64.deb Size/MD5: 310910 6d00e43ef0be60fe2c5db3e1cde48127 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple0_2.2.1-1ubuntu4.1_amd64.deb Size/MD5:1565274 4c74db778897bed1782afea6a1c38742 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-dbg_2.2.1-1ubuntu4.1_amd64.deb Size/MD5:4871182 31271504b5a4fc8192d713d09da99daf http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1_amd64.deb Size/MD5: 646292 93e5eb84e32f3fba7de5270faf909a2d i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/finch_2.2.1-1ubuntu4.1_i386.deb Size/MD5: 292670 46a2a01d100dda87d8ac0fffbb3c12cf http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple0_2.2.1-1ubuntu4.1_i386.deb Size/MD5:1453538 ee5e546d0516add420246a17ad93b279 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-dbg_2.2.1-1ubuntu4.1_i386.deb Size/MD5:4580778 21ea33720d2fe377426090fc55b62834 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1_i386.deb Size/MD5: 603440 9bb6a73b205318fb3129f8b259711ce5 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/finch_2.2.1-1ubuntu4.1_powerpc.deb Size/MD5: 326628 98586b4303b729c727bd72ba925a06f5 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple0_2.2.1-1ubuntu4.1_powerpc.deb Size/MD5:1631546 0625ae9b6eb0695e11aae31dbc596cad http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-dbg_2.2.1-1ubuntu4.1_powerpc.deb Size/MD5:4842230 5c341ab354bff24a7a123b56ca33282c http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1_powerpc.deb Size/MD5: 678294 2f8ee075a90426ed3bdc6a937647b25f sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/finch_2.2.1-1ubuntu4.1_sparc.deb Size/MD5: 294508 29c52f55d7f31251ee2abe3812741083 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/libpurple0_2.2.1-1ubuntu4.1_sparc.deb Size/MD5:1482860 46e3727c77c4ce6e45787820fff46728 http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin-dbg_2.2.1-1ubuntu4.1_sparc.deb Size/MD5:4445306 865d1edbe88878f3bc06bd13d4857edc http://security.ubuntu.com/ubuntu/pool/main/p/pidgin/pidgin_2.2.1-1ubuntu4.1_sparc.deb Size/MD5: 609512 113d0464160560a69c773c79d686e1c7 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-548-1 OTHER REFERENCES: SA27372: http://secunia.com/advisories/27372/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------