/www/pidgin: 50edecb2fcf3: Pidgin 2.10.7

Mark Doliner mark at kingant.net
Wed Feb 13 10:08:39 EST 2013


Changeset: 50edecb2fcf3e8b997331b4780b8449f2245d5b4
Author:	 Mark Doliner <mark at kingant.net>
Date:	 2013-02-13 07:08 -0800
Branch:	 default
URL: http://hg.pidgin.im/www/pidgin/rev/50edecb2fcf3

Description:

Pidgin 2.10.7

diffstat:

 htdocs/ChangeLog               |  98 ++++++++++++++++++++++++++++++++++++++++++
 htdocs/index.php               |   2 +-
 htdocs/news/security/index.php |  40 +++++++++++++++++
 inc/version.inc                |   4 +-
 4 files changed, 141 insertions(+), 3 deletions(-)

diffs (185 lines):

diff --git a/htdocs/ChangeLog b/htdocs/ChangeLog
--- a/htdocs/ChangeLog
+++ b/htdocs/ChangeLog
@@ -1,5 +1,103 @@
 Pidgin and Finch: The Pimpin' Penguin IM Clients That're Good for the Soul
 
+version 2.10.7 (02/13/2013):
+	Alien hatchery:
+	* No changes
+
+	General:
+	* The configure script will now exit with status 1 when specifying
+	  invalid protocol plugins using the --with-static-prpls and
+	  --with-dynamic-prpls arguments. (Michael Fiedler) (#15316)
+
+	libpurple:
+	* Fix a crash when receiving UPnP responses with abnormally long values.
+	  (CVE-2013-0274)
+	* Don't link directly to libgcrypt when building with GnuTLS support.
+	  (Bartosz Brachaczek) (#15329)
+	* Fix UPnP mappings on routers that return empty <URLBase/> elements
+	  in their response. (Ferdinand Stehle) (#15373)
+	* Tcl plugin uses saner, race-free plugin loading.
+	* Fix the Tcl signals-test plugin for savedstatus-changed.
+	  (Andrew Shadura) (#15443)
+
+	Pidgin:
+	* Make Pidgin more friendly to non-X11 GTK+, such as MacPorts' +no_x11
+	  variant.
+
+	Gadu-Gadu:
+	* Fix a crash at startup with large contact list. Avatar support for
+	  buddies will be disabled until 3.0.0. (#15226, #14305)
+
+	IRC:
+	* Support for SASL authentication. (Thijs Alkemade, Andy Spencer)
+	  (#13270)
+	* Print topic setter information at channel join. (#13317)
+
+	MSN:
+	* Fix SSL certificate issue when signing into MSN for some users.
+	* Fix a crash when removing a user before its icon is loaded. (Mark
+	  Barfield) (#15217)
+
+	MXit:
+	* Fix two bugs where a remote MXit user could possibly specify a local
+	  file path to be written to. (CVE-2013-0271)
+	* Fix a bug where the MXit server or a man-in-the-middle could
+	  potentially send specially crafted data that could overflow a buffer
+	  and lead to a crash or remote code execution. (CVE-2013-0272)
+	* Display farewell messages in a different colour to distinguish
+	  them from normal messages.
+	* Add support for typing notification.
+	* Add support for the Relationship Status profile attribute.
+	* Remove all reference to Hidden Number.
+	* Ignore new invites to join a GroupChat if you're already joined, or
+	  still have a pending invite.
+	* The buddy's name was not centered vertically in the buddy-list if they
+	  did not have a status-message or mood set.
+	* Fix decoding of font-size changes in the markup of received messages.
+	* Increase the maximum file size that can be transferred to 1 MB.
+	* When setting an avatar image, no longer downscale it to 96x96.
+
+	Sametime:
+	* Fix a crash in Sametime when a malicious server sends us an abnormally
+	  long user ID. (CVE-2013-0273)
+
+	Yahoo!:
+	* Fix a double-free in profile/picture loading code. (Mihai Serban)
+	  (#15053)
+	* Fix retrieving server-side buddy aliases. (Catalin Salgu) (#15381)
+
+	Plugins:
+	* The Voice/Video Settings plugin supports using the sndio GStreamer
+	  backends. (Brad Smith) (#14414)
+	* Fix a crash in the Contact Availability Detection plugin. (Mark)
+	  (#15327)
+	* Make the Message Notification plugin more friendly to non-X11 GTK+,
+	  such as MacPorts' +no_x11 variant.
+
+	Windows-Specific Changes:
+	* Compile with secure flags (Jurre van Bergen) (#15290)
+	* Installer downloads GTK+ Runtime and Debug Symbols more securely.
+	  Thanks goes to Jacob Appelbaum of the Tor Project for identifying
+	  this issue and suggesting solutions. (#15277)
+	* Updates to a number of dependencies, some of which have security
+	  related fixes. Thanks again to Jacob Appelbaum and Jurre van Bergen
+	  for identifying the vulnerable libraries and to Dieter Verfaillie 
+	  for helping getting the libraries updated. (#14571, #15285, #15286)
+		* ATK 1.32.0-2
+		* Cyrus SASL 2.1.25
+		* expat 2.1.0-1
+		* freetype 2.4.10-1
+		* gettext 0.18.1.1-2
+		* Glib 2.28.8-1
+		* libpng 1.4.12-1
+		* libxml2 2.9.0-1
+		* NSS 3.13.6 and NSPR 4.9.2
+		* Pango 1.29.4-1
+		* SILC 1.1.10
+		* zlib 1.2.5-2
+	* Patch libmeanwhile (sametime library) to fix crash. (Jonathan Rice)
+	  (#12637)
+
 version 2.10.6 (07/06/2012):
 	Pidgin:
 	* Fix a bug that requires a triple-click to open a conversation
diff --git a/htdocs/index.php b/htdocs/index.php
--- a/htdocs/index.php
+++ b/htdocs/index.php
@@ -115,7 +115,7 @@
 
 <p class="more" id="lowblurb">
 <!-- Put little news blurbs here! -->
-Pidgin 2.10.5 contains <a href="/news/security/?id=64">a security update</a> for users of MXit, and 2.10.6 contains a fix for a buddy list double-click bug that snuck into 2.10.5.  Please upgrade if you use MXit!
+Pidgin 2.10.7 contains <a href="/news/security/">some security updates</a> for users of MXit, Sametime, and anyone connected to a public network (unencrypted Wi-Fi, universities, offices, etc).  It also contains updated SSL certificates to fix signin problems with MSN.  Please upgrade!
 </p>
 
 </div>
diff --git a/htdocs/news/security/index.php b/htdocs/news/security/index.php
--- a/htdocs/news/security/index.php
+++ b/htdocs/news/security/index.php
@@ -683,6 +683,46 @@
 		"fixrevisions" => "ded93865ef42",
 		"fixedversion" => "2.10.5",
 		"discoveredby" => "Ulf Härnhammar"
+	),
+	array(
+		"title"        => "Remote MXit user could specify local file path",
+		"date"         => "2013-02-13",
+		"cve"          => "CVE-2013-0271",
+		"description"  => "The MXit protocol plugin saves an image to local disk using a filename that could potentially be partially specified by the IM server or by a remote user.",
+		"fix"          => "Escape values that come from the network before using them in filenames.",
+		"fixrevisions" => "a8aef1d340f2",
+		"fixedversion" => "2.10.7",
+		"discoveredby" => "Chris Wysopal, Veracode"
+	),
+	array(
+		"title"        => "MXit buffer overflow reading data from network",
+		"date"         => "2013-02-13",
+		"cve"          => "CVE-2013-0272",
+		"description"  => "The code did not respect the size of the buffer when parsing HTTP headers, and a malicious server or man-in-the-middle could send specially crafted data that could overflow the buffer.  This could lead to a crash or remote code execution.",
+		"fix"          => "Check buffer bounds when reading and parsing incoming HTTP data.",
+		"fixrevisions" => "879db2a9a59c",
+		"fixedversion" => "2.10.7",
+		"discoveredby" => "Coverity static analysis"
+	),
+	array(
+		"title"        => "Sametime crash with long user IDs",
+		"date"         => "2013-02-13",
+		"cve"          => "CVE-2013-0273",
+		"description"  => "libpurple failed to null-terminate user IDs that were longer than 4096 bytes.  It's plausible that a malicious server could send one of these to us, which would lead to a crash.",
+		"fix"          => "Use g_strlcpy() instead of strncpy() to guarrantee that the string is null-terminated.",
+		"fixrevisions" => "c31cf8de31cd",
+		"fixedversion" => "2.10.7",
+		"discoveredby" => "Coverity static analysis"
+	),
+	array(
+		"title"        => "Crash when receiving a UPnP response with abnormally long values",
+		"date"         => "2013-02-13",
+		"cve"          => "CVE-2013-0274",
+		"description"  => "libpurple failed to null-terminate some strings when parsing the response from a UPnP router.  This could lead to a crash if a malicious user on your network responds with a specially crafted message.",
+		"fix"          => "Use g_strlcpy() instead of strncpy() to guarrantee that strings are null-terminated.",
+		"fixrevisions" => "ad7e7fb98db3",
+		"fixedversion" => "2.10.7",
+		"discoveredby" => "Coverity static analysis"
 	)
 );
 /*	Template for the unfortunate future
diff --git a/inc/version.inc b/inc/version.inc
--- a/inc/version.inc
+++ b/inc/version.inc
@@ -1,10 +1,10 @@
 <?php
 
 // Current Pidgin Release
-$pidgin_version        = "2.10.6";
+$pidgin_version        = "2.10.7";
 
 // Current Windows Pidgin Release
-$pidgin_win32_version  = "2.10.6";
+$pidgin_win32_version  = "2.10.7";
 
 // Version of Pidgin in the Ubuntu PPA
 $pidgin_ubuntu_version = "2.10.6";



More information about the Commits mailing list