Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#15990 - [pidgin] MSN overflow parsing SLP messages
Attached to Project:
Arch Linux
Opened by ricsch (ricsch) - Wednesday, 19 August 2009, 13:47 GMT
Last edited by Jan de Groot (JGC) - Friday, 04 September 2009, 20:15 GMT
Opened by ricsch (ricsch) - Wednesday, 19 August 2009, 13:47 GMT
Last edited by Jan de Groot (JGC) - Friday, 04 September 2009, 20:15 GMT
|
DetailsDescription:
http://www.pidgin.im/news/security/?id=34 http://www.coresecurity.com/content/libpurple-arbitrary-write Additional info: * package version(s): versions <2.5.9 are affected Please update to version 2.6.1 immediately to fix the security hole. |
This task depends upon
Closed by Jan de Groot (JGC)
Friday, 04 September 2009, 20:15 GMT
Reason for closing: Fixed
Additional comments about closing: Pidgin is updated.
Friday, 04 September 2009, 20:15 GMT
Reason for closing: Fixed
Additional comments about closing: Pidgin is updated.
READ THIS!
FTA: "Reasons for not being a bug ... # A package which is not-up-to-date. Use the Flag Package Out-of-Date feature on Arch's packages website."