Change logs for pidgin source package in Wily

  • pidgin (1:2.10.11-0ubuntu4.2) wily-security; urgency=medium
    
      * SECURITY UPDATE: denial of service and code execution in MXIT protocol
        - debian/patches/CVE-2016-*.patch: fix multiple issues.
        - CVE-2016-2365
        - CVE-2016-2366
        - CVE-2016-2367
        - CVE-2016-2368
        - CVE-2016-2369
        - CVE-2016-2370
        - CVE-2016-2371
        - CVE-2016-2372
        - CVE-2016-2373
        - CVE-2016-2374
        - CVE-2016-2375
        - CVE-2016-2376
        - CVE-2016-2377
        - CVE-2016-2378
        - CVE-2016-2380
        - CVE-2016-4323
    
     -- Marc Deslauriers <email address hidden>  Tue, 12 Jul 2016 08:49:31 -0400
  • pidgin (1:2.10.11-0ubuntu4.1) wily; urgency=medium
    
      * debian/patches/hg_gst_leak.patch:
        "When receiving an error or stream finished message, we can free the
         Gstreamer pipeline so we don't leak it for each sound." (lp: #1479715)
    
     -- Sebastien Bacher <email address hidden>  Tue, 23 Feb 2016 11:38:09 +0100
  • pidgin (1:2.10.11-0ubuntu4) wily; urgency=medium
    
      * No change rebuild against libfarstream-0.2-5
    
     -- Robert Ancell <email address hidden>  Thu, 25 Jun 2015 20:23:27 +1200
  • pidgin (1:2.10.11-0ubuntu3) wily; urgency=medium
    
      * debian/control:
        - Build-depend on python3
        - libpurple-bin depends on python3, python3-dbus
        - Add missing depend on dbus for libpurple-bin
      * debian/patches/python3.patch:
        - Use Python 3 (LP: #1440390)
    
     -- Robert Ancell <email address hidden>  Thu, 11 Jun 2015 09:42:14 +1200
  • pidgin (1:2.10.11-0ubuntu2) wily; urgency=medium
    
      * debian/control:
        - Build-depend on libgstreamer1.0-dev, libgstreamer-plugins-base1.0-dev,
          libfarstream-0.2
        - Recommend gstreamer1.0-plugins-base, gstreamer1.0-plugins-good
      * debian/patches/gstreamer1.patch:
        - Use gstreamer 1.0 (LP: #1295207)
    
     -- Robert Ancell <email address hidden>  Fri, 29 May 2015 11:28:51 +1200
  • pidgin (1:2.10.11-0ubuntu1) wily; urgency=medium
    
      * New upstream release (LP: #1402424)
      * debian/patches/CVE-2014-3775.patch:
      * debian/patches/CVE-2014-3698.patch:
      * debian/patches/CVE-2014-3696.patch:
      * debian/patches/CVE-2014-3695.patch:
      * debian/patches/CVE-2014-3694.patch:
        - Applied upstream
      * debian/libpurple0.symbols:
        - Updated
    
     -- Robert Ancell <email address hidden>  Fri, 29 May 2015 10:51:05 +1200
  • pidgin (1:2.10.9-0ubuntu8) vivid; urgency=medium
    
      * SECURITY UPDATE: insufficient ssl certificate validation
        - debian/patches/CVE-2014-3694.patch: fix basic constraints checking in
          libpurple/certificate.c, libpurple/certificate.h,
          libpurple/plugins/ssl/ssl-gnutls.c, libpurple/plugins/ssl/ssl-nss.c.
        - CVE-2014-3694
      * SECURITY UPDATE: denial of service via malformed MXit emoticon response
        - debian/patches/CVE-2014-3695.patch: properly check lengths in
          libpurple/protocols/mxit/markup.c.
        - CVE-2014-3695
      * SECURITY UPDATE: denial of service via malformed Groupwise message
        - debian/patches/CVE-2014-3696.patch: check sizes in
          libpurple/protocols/novell/nmevent.c.
        - CVE-2014-3696
      * SECURITY UPDATE: XMPP information leak
        - debian/patches/CVE-2014-3698.patch: fix leaks in
          libpurple/protocols/jabber/jutil.c.
        - CVE-2014-3698
     -- Marc Deslauriers <email address hidden>   Tue, 28 Oct 2014 08:11:48 -0400