From: Mandriva Security Team <security@mandriva.com.>
To: [email protected]Subject: MDKSA-2005:099 - Updated gaim packages fix more vulnerabilities
Message-Id: <E1DiIog-0006Yk-AD@mercury.mandriva.com.>
Sender: QATeam User <qateam@mercury.mandriva.com.>
Date: Tue, 14 Jun 2005 15:19:26 -0600
X-Virus-Scanned: antivirus-gw at tyumen.ru
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Update Advisory
_______________________________________________________________________
Package name: gaim
Advisory ID: MDKSA-2005:099
Date: June 14th, 2005
Affected versions: 10.1, 10.2, Corporate 3.0
______________________________________________________________________
Problem Description:
More vulnerabilities have been discovered in the gaim IM client. The
first is a remote crash with the Yahoo! protocol (CAN-2005-1269) and
the second is a remote DoS in the MSN protocol (CAN-2005-1934).
These problems have been corrected in gaim 1.3.1 which is provided with
this update.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1269http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1934
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.1:
6e4fcf0213cb1239d68dd516527e8243 10.1/RPMS/gaim-1.3.1-0.1.101mdk.i586.rpm
267ef252ba9947e9b64bde9dddebe21e 10.1/RPMS/gaim-devel-1.3.1-0.1.101mdk.i586.rpm
31e933f06152ce1c6fa9057f1ead1364 10.1/RPMS/gaim-gevolution-1.3.1-0.1.101mdk.i586.rpm
e49e26277de52b0a2e4abbf3bceb2742 10.1/RPMS/gaim-perl-1.3.1-0.1.101mdk.i586.rpm
9c8065be22410ada3a470d95a844d881 10.1/RPMS/gaim-tcl-1.3.1-0.1.101mdk.i586.rpm
9aa758d669e32efdd1f0584f77f9f55d 10.1/RPMS/libgaim-remote0-1.3.1-0.1.101mdk.i586.rpm
66f4c7bcee4faf74c2ba012cd7ba289f 10.1/RPMS/libgaim-remote0-devel-1.3.1-0.1.101mdk.i586.rpm
7fc91e876195bb1257ff5b428e306fdf 10.1/SRPMS/gaim-1.3.1-0.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
9876d97be01fe46772f8f80ce28f5ccf x86_64/10.1/RPMS/gaim-1.3.1-0.1.101mdk.x86_64.rpm
49750a6aa86e6e09dc16f2317f7e0062 x86_64/10.1/RPMS/gaim-devel-1.3.1-0.1.101mdk.x86_64.rpm
3ba1aaa598b1a90d2d7dfea3bd744d9e x86_64/10.1/RPMS/gaim-gevolution-1.3.1-0.1.101mdk.x86_64.rpm
cb7ef50532ea094e4cf0ebe707931740 x86_64/10.1/RPMS/gaim-perl-1.3.1-0.1.101mdk.x86_64.rpm
2110f664d1c4e4c3dfcf84c3696b60d3 x86_64/10.1/RPMS/gaim-tcl-1.3.1-0.1.101mdk.x86_64.rpm
178bd8ac319f10604b8327790743526f x86_64/10.1/RPMS/lib64gaim-remote0-1.3.1-0.1.101mdk.x86_64.rpm
db568bc151eb0b6211344c7608dd6099 x86_64/10.1/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.101mdk.x86_64.rpm
7fc91e876195bb1257ff5b428e306fdf x86_64/10.1/SRPMS/gaim-1.3.1-0.1.101mdk.src.rpm
Mandrakelinux 10.2:
72bed53f4a863d4bb3e7515d7a30adef 10.2/RPMS/gaim-1.3.1-0.1.102mdk.i586.rpm
9a5ee47f3921ea57a6d3385c60379186 10.2/RPMS/gaim-devel-1.3.1-0.1.102mdk.i586.rpm
66ba156f6e65011761ddfca073e6dc94 10.2/RPMS/gaim-gevolution-1.3.1-0.1.102mdk.i586.rpm
1426070274bafd55bdc3eadea2ebfa3a 10.2/RPMS/gaim-perl-1.3.1-0.1.102mdk.i586.rpm
3b77402203fa59aa449b046a7c58749d 10.2/RPMS/gaim-silc-1.3.1-0.1.102mdk.i586.rpm
1115565b2f2ba8505c9012ef472b35b8 10.2/RPMS/gaim-tcl-1.3.1-0.1.102mdk.i586.rpm
af6689ae3b55c35dbd2823b2a7474016 10.2/RPMS/libgaim-remote0-1.3.1-0.1.102mdk.i586.rpm
5d9bb26bca7d190dfa4f138621a85edf 10.2/RPMS/libgaim-remote0-devel-1.3.1-0.1.102mdk.i586.rpm
9f397d2a338771fdf24f9d37ce55fd85 10.2/SRPMS/gaim-1.3.1-0.1.102mdk.src.rpm
Mandrakelinux 10.2/X86_64:
4189d6699c1a05c97b170e81d549f8ea x86_64/10.2/RPMS/gaim-1.3.1-0.1.102mdk.x86_64.rpm
0a235252f3509b3c3dc15d71482f39b0 x86_64/10.2/RPMS/gaim-devel-1.3.1-0.1.102mdk.x86_64.rpm
4ed3e16d23379d1a87474d4712671357 x86_64/10.2/RPMS/gaim-gevolution-1.3.1-0.1.102mdk.x86_64.rpm
0d604302e4abd887e5bf4b46d4ab19d1 x86_64/10.2/RPMS/gaim-perl-1.3.1-0.1.102mdk.x86_64.rpm
d115b6f98c2c93658810ed35aa54e108 x86_64/10.2/RPMS/gaim-silc-1.3.1-0.1.102mdk.x86_64.rpm
88ad11a13f42cc093728061437c7de86 x86_64/10.2/RPMS/gaim-tcl-1.3.1-0.1.102mdk.x86_64.rpm
21e357632a07cc8e8fbcf280384d3642 x86_64/10.2/RPMS/lib64gaim-remote0-1.3.1-0.1.102mdk.x86_64.rpm
f0971fdfda8337897dfbfb9e0ee04fdb x86_64/10.2/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.102mdk.x86_64.rpm
9f397d2a338771fdf24f9d37ce55fd85 x86_64/10.2/SRPMS/gaim-1.3.1-0.1.102mdk.src.rpm
Corporate 3.0:
ad4c433c3a75e8b4b24eb0a66caca44f corporate/3.0/RPMS/gaim-1.3.1-0.1.C30mdk.i586.rpm
8e279142cc357b43a8c58a3c73ac9b5e corporate/3.0/RPMS/gaim-devel-1.3.1-0.1.C30mdk.i586.rpm
661dea400ea206801c3a4434154405b7 corporate/3.0/RPMS/gaim-perl-1.3.1-0.1.C30mdk.i586.rpm
93090aa5d4a50e578824af9f3a5d4995 corporate/3.0/RPMS/gaim-tcl-1.3.1-0.1.C30mdk.i586.rpm
9fff14e865ab7667b6a03c7bb406f32b corporate/3.0/RPMS/libgaim-remote0-1.3.1-0.1.C30mdk.i586.rpm
067375646e00fb20ab7a2c9b2e48a951 corporate/3.0/RPMS/libgaim-remote0-devel-1.3.1-0.1.C30mdk.i586.rpm
92a5283dc08a218a563df01b1c6dbe4a corporate/3.0/SRPMS/gaim-1.3.1-0.1.C30mdk.src.rpm
Corporate 3.0/X86_64:
bf58aaf15a384a62ccdeeac89316e0b9 x86_64/corporate/3.0/RPMS/gaim-1.3.1-0.1.C30mdk.x86_64.rpm
6539c1d78d9c17c05d33c44036adc1fe x86_64/corporate/3.0/RPMS/gaim-devel-1.3.1-0.1.C30mdk.x86_64.rpm
fa92889caa8ce98b40598f0a5e8d12e9 x86_64/corporate/3.0/RPMS/gaim-perl-1.3.1-0.1.C30mdk.x86_64.rpm
0114367256677963d91e09bffe9bed2f x86_64/corporate/3.0/RPMS/gaim-tcl-1.3.1-0.1.C30mdk.x86_64.rpm
8d66f38ed47ae7e5dc093c2086f414de x86_64/corporate/3.0/RPMS/lib64gaim-remote0-1.3.1-0.1.C30mdk.x86_64.rpm
fd52dd04761c70fc9a34bd080f60fa9f x86_64/corporate/3.0/RPMS/lib64gaim-remote0-devel-1.3.1-0.1.C30mdk.x86_64.rpm
92a5283dc08a218a563df01b1c6dbe4a x86_64/corporate/3.0/SRPMS/gaim-1.3.1-0.1.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFCr0nemqjQ0CJFipgRAuVGAKCotXpx0966FGW3GHor6Iv7fEKJSgCdE6Az
YTx/D/FFc0AqwJwS8uW8bdk=
=D05A
-----END PGP SIGNATURE-----