Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-0272 (GCVE-0-2013-0272)
Vulnerability from cvelistv5
Published
2013-02-16 21:00
Modified
2024-08-06 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2013:0388", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "name": "USN-1746-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "name": "57951", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/57951" }, { "name": "openSUSE-SU-2013:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "name": "oval:org.mitre.oval:def:17474", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "name": "openSUSE-SU-2013:0407", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pidgin.im/news/security/?id=66" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SU-2013:0388", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "name": "USN-1746-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "name": "57951", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/57951" }, { "name": "openSUSE-SU-2013:0405", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "name": "oval:org.mitre.oval:def:17474", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "name": "openSUSE-SU-2013:0407", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pidgin.im/news/security/?id=66" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2013:0388", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "name": "USN-1746-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "name": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c", "refsource": "CONFIRM", "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "name": "57951", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57951" }, { "name": "openSUSE-SU-2013:0405", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "name": "oval:org.mitre.oval:def:17474", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "name": "openSUSE-SU-2013:0407", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "name": "http://www.pidgin.im/news/security/?id=66", "refsource": "CONFIRM", "url": "http://www.pidgin.im/news/security/?id=66" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0272", "datePublished": "2013-02-16T21:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T14:18:09.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-0272\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-02-16T21:55:02.153\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en http.c en el plugin de protocolo MXit en libpurple en Pidgin anteiror a v2.10.7 permite a servidores remotos ejecutar c\u00f3digo mediante un header HTTP de gran longitud.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.6\",\"matchCriteriaId\":\"9B94ED22-0FD0-4A51-887F-8A100C750567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC2EBF3-73A7-4542-8E9C-47A4241A224C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF62072D-4956-4FE6-931E-E6EE9C49F3E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6499D8D5-0801-498C-BD4D-508506918CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CC76CD-FF35-4B3A-9F1E-4E5A65963057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F694A1FC-2F10-48F9-8E8D-C88A8E7397AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D22A117-78BE-4BAC-8A2A-6C00C9E3A4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59E216BC-29E4-4C31-9CF0-DE22C2E84968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD203F7-B983-4FDD-9837-D68D4F388A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB90B7CB-1A11-45A8-B0BC-9B2143D84A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8E3CBA-2B33-49EF-9105-8DDBB938F519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72AA3282-CA7D-438C-A07C-A63392333630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEEFF420-2868-422B-BD22-9A5749C2398F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B139D83D-7D18-42C7-988C-2070B66CB943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047D9636-BCCE-4956-B5A3-D276F1C2EF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8A794E-E1CB-4F0F-9739-D625E94EA566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E64EEEA0-89CE-46BD-B387-A96521E76A6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E96AA3-B567-4E97-979A-D97A4F786D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C407C0-99A2-477B-87CF-6BE9F7B367E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEF0457-39D8-465B-86A7-8DFA44A1F820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E593BFF0-650E-4EDB-BF65-C509C8A807C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39468D5-1378-4441-B927-5C34C85B18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C80012AD-8F49-4287-8AEC-C21AC5774CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB3CF0C-BECE-4685-A370-96424B0A5703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D5BC0FC-2F7D-41BE-83E4-AEDACD71F427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8321D92-B935-4C2A-81B1-5984BFF4FD57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43679F1D-E48D-483B-A67B-9DB8C641F649\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00032CBA-479E-4880-ACAE-3B0F066C8146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B11BCF7-3127-4B2E-967F-2B22A229592E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E89655-FE9E-4B05-8DF9-59894B81B6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9A75D8-CFA6-4605-A0CB-AA5EA2FA8316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD841629-4ADC-4122-A7E1-AED505E48150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A539AD7F-4D84-4F80-844E-0404813C9384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55F197-5A6E-48EE-8BB1-C75C19DCBE4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9D5D3E-2565-42CD-9254-F7E5B1980F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DFC5300-4BF5-4204-8A6C-0B86998022D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02865EB9-AFA1-4584-B487-D510350F82D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E00006E6-1999-4967-8BE9-2B7265F3E6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61BD8C57-DD49-44C1-BD0A-0A1210C1BE57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF5CD573-D9CE-41E6-8FAB-7DBEA4E545F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2389B152-70AC-47A7-BDAE-3A7F0550E6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A81DAE1-4633-46A9-8DC9-42E6EC1D641B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE026B2-73D6-43AD-9003-B159992D0323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACCCDDDA-58C9-443A-9D7F-44D362E363C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC30F6B-4170-4FBF-AA69-B6BBE25EC3C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1337152-04D4-4439-8F49-B6BCE271A3AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A730DE04-9886-4920-A210-6C41CD77E330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A7F491-499A-4E1B-B5DB-FC1186DD6672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEE2341-00C0-48D7-867F-DF18D4BBEE27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450890EF-3950-4603-8402-BBD539D6CF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF30FFB0-19E7-4385-A752-BEAD0A085CC1\"}]}]}],\"references\":[{\"url\":\"http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.pidgin.im/news/security/?id=66\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57951\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1746-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.pidgin.im/news/security/?id=66\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/57951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1746-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2013-0272
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-0272", "description": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.", "id": "GSD-2013-0272", "references": [ "https://www.suse.com/security/cve/CVE-2013-0272.html", "https://access.redhat.com/errata/RHSA-2013:0646", "https://linux.oracle.com/cve/CVE-2013-0272.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-0272" ], "details": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.", "id": "GSD-2013-0272", "modified": "2023-12-13T01:22:14.945965Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SU-2013:0388", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "name": "USN-1746-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "name": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c", "refsource": "CONFIRM", "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "name": "57951", "refsource": "BID", "url": "http://www.securityfocus.com/bid/57951" }, { "name": "openSUSE-SU-2013:0405", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "name": "oval:org.mitre.oval:def:17474", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "name": "openSUSE-SU-2013:0407", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "name": "http://www.pidgin.im/news/security/?id=66", "refsource": "CONFIRM", "url": "http://www.pidgin.im/news/security/?id=66" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0272" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.pidgin.im/news/security/?id=66", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.pidgin.im/news/security/?id=66" }, { "name": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c", "refsource": "CONFIRM", "tags": [], "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "name": "SUSE-SU-2013:0388", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "name": "USN-1746-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "name": "openSUSE-SU-2013:0407", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "name": "openSUSE-SU-2013:0405", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "name": "57951", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/57951" }, { "name": "oval:org.mitre.oval:def:17474", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-19T01:35Z", "publishedDate": "2013-02-16T21:55Z" } } }
ghsa-xc58-69j7-pj34
Vulnerability from github
Published
2022-05-05 02:48
Modified
2022-05-05 02:48
VLAI Severity ?
Details
Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
{ "affected": [], "aliases": [ "CVE-2013-0272" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-02-16T21:55:00Z", "severity": "MODERATE" }, "details": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.", "id": "GHSA-xc58-69j7-pj34", "modified": "2022-05-05T02:48:42Z", "published": "2022-05-05T02:48:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "type": "WEB", "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "type": "WEB", "url": "http://www.pidgin.im/news/security/?id=66" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/57951" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1746-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2013:0646
Vulnerability from csaf_redhat
Published
2013-03-14 16:45
Modified
2025-08-01 20:56
Summary
Red Hat Security Advisory: pidgin security update
Notes
Topic
Updated pidgin packages that fix three security issues are now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.
A stack-based buffer overflow flaw was found in the Pidgin MXit protocol
plug-in. A malicious server or a remote attacker could use this flaw to
crash Pidgin by sending a specially-crafted HTTP request. (CVE-2013-0272)
A buffer overflow flaw was found in the Pidgin Sametime protocol plug-in.
A malicious server or a remote attacker could use this flaw to crash Pidgin
by sending a specially-crafted username. (CVE-2013-0273)
A buffer overflow flaw was found in the way Pidgin processed certain UPnP
responses. A remote attacker could send a specially-crafted UPnP response
that, when processed, would crash Pidgin. (CVE-2013-0274)
Red Hat would like to thank the Pidgin project for reporting the above
issues. Upstream acknowledges Daniel Atallah as the original reporter of
CVE-2013-0272.
All Pidgin users should upgrade to these updated packages, which contain
backported patches to resolve these issues. Pidgin must be restarted for
this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated pidgin packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Pidgin is an instant messaging program which can log in to multiple\naccounts on multiple instant messaging networks simultaneously.\n\nA stack-based buffer overflow flaw was found in the Pidgin MXit protocol\nplug-in. A malicious server or a remote attacker could use this flaw to\ncrash Pidgin by sending a specially-crafted HTTP request. (CVE-2013-0272)\n\nA buffer overflow flaw was found in the Pidgin Sametime protocol plug-in.\nA malicious server or a remote attacker could use this flaw to crash Pidgin\nby sending a specially-crafted username. (CVE-2013-0273)\n\nA buffer overflow flaw was found in the way Pidgin processed certain UPnP\nresponses. A remote attacker could send a specially-crafted UPnP response\nthat, when processed, would crash Pidgin. (CVE-2013-0274)\n\nRed Hat would like to thank the Pidgin project for reporting the above\nissues. Upstream acknowledges Daniel Atallah as the original reporter of\nCVE-2013-0272.\n\nAll Pidgin users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. Pidgin must be restarted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0646", "url": "https://access.redhat.com/errata/RHSA-2013:0646" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "910040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040" }, { "category": "external", "summary": "910041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041" }, { "category": "external", "summary": "910042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0646.json" } ], "title": "Red Hat Security Advisory: pidgin security update", "tracking": { "current_release_date": "2025-08-01T20:56:56+00:00", "generator": { "date": "2025-08-01T20:56:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2013:0646", "initial_release_date": "2013-03-14T16:45:00+00:00", "revision_history": [ { "date": "2013-03-14T16:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-03-14T16:48:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T20:56:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL Optional Productivity Applications (v. 5 server)", "product": { "name": "RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_productivity:5" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pidgin-0:2.6.6-17.el5_9.1.i386", "product": { "name": "pidgin-0:2.6.6-17.el5_9.1.i386", "product_id": "pidgin-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.6.6-17.el5_9.1.i386", "product": { "name": "libpurple-devel-0:2.6.6-17.el5_9.1.i386", "product_id": "libpurple-devel-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "libpurple-0:2.6.6-17.el5_9.1.i386", "product": { "name": "libpurple-0:2.6.6-17.el5_9.1.i386", "product_id": "libpurple-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.6.6-17.el5_9.1.i386", "product": { "name": "pidgin-devel-0:2.6.6-17.el5_9.1.i386", "product_id": "pidgin-devel-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "finch-devel-0:2.6.6-17.el5_9.1.i386", "product": { "name": "finch-devel-0:2.6.6-17.el5_9.1.i386", "product_id": "finch-devel-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "product": { "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "product_id": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "finch-0:2.6.6-17.el5_9.1.i386", "product": { "name": "finch-0:2.6.6-17.el5_9.1.i386", "product_id": "finch-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "pidgin-perl-0:2.6.6-17.el5_9.1.i386", "product": { "name": "pidgin-perl-0:2.6.6-17.el5_9.1.i386", "product_id": "pidgin-perl-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-perl@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "libpurple-perl-0:2.6.6-17.el5_9.1.i386", "product": { "name": "libpurple-perl-0:2.6.6-17.el5_9.1.i386", "product_id": "libpurple-perl-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-perl@2.6.6-17.el5_9.1?arch=i386" } } }, { "category": "product_version", "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "product": { "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "product_id": "libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-tcl@2.6.6-17.el5_9.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "pidgin-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "pidgin-0:2.6.6-17.el5_9.1.x86_64", "product_id": "pidgin-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "product_id": "pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-perl@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "product_id": "libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-perl@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "product_id": "libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "libpurple-0:2.6.6-17.el5_9.1.x86_64", "product_id": "libpurple-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "product_id": "pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "product_id": "libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-tcl@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "finch-devel-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "finch-devel-0:2.6.6-17.el5_9.1.x86_64", "product_id": "finch-devel-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "product_id": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "finch-0:2.6.6-17.el5_9.1.x86_64", "product": { "name": "finch-0:2.6.6-17.el5_9.1.x86_64", "product_id": "finch-0:2.6.6-17.el5_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.6.6-17.el5_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "product_id": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-docs@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "product_id": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "product_id": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-perl@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "product_id": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-tcl@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "product_id": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "product_id": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "product_id": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-perl@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "product_id": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "product_id": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "finch-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64", "product_id": "finch-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.7.9-10.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "product": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "product_id": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.7.9-10.el6_4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "pidgin-0:2.6.6-17.el5_9.1.src", "product": { "name": "pidgin-0:2.6.6-17.el5_9.1.src", "product_id": "pidgin-0:2.6.6-17.el5_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.6.6-17.el5_9.1?arch=src" } } }, { "category": "product_version", "name": "pidgin-0:2.7.9-10.el6_4.1.src", "product": { "name": "pidgin-0:2.7.9-10.el6_4.1.src", "product_id": "pidgin-0:2.7.9-10.el6_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.7.9-10.el6_4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "finch-devel-0:2.7.9-10.el6_4.1.i686", "product": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686", "product_id": "finch-devel-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "product": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "product_id": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "product": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "product_id": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "product": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "product_id": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "finch-0:2.7.9-10.el6_4.1.i686", "product": { "name": "finch-0:2.7.9-10.el6_4.1.i686", "product_id": "finch-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "libpurple-0:2.7.9-10.el6_4.1.i686", "product": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686", "product_id": "libpurple-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "product": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "product_id": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-docs@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "product": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "product_id": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-perl@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "product": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "product_id": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-tcl@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "product": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "product_id": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-perl@2.7.9-10.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "pidgin-0:2.7.9-10.el6_4.1.i686", "product": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686", "product_id": "pidgin-0:2.7.9-10.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.7.9-10.el6_4.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "product_id": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-docs@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "product_id": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "product_id": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-perl@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "product_id": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-tcl@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "product_id": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "product_id": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "product_id": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-perl@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "product_id": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "product_id": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "finch-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64", "product_id": "finch-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.7.9-10.el6_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "product": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "product_id": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.7.9-10.el6_4.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "product_id": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch-devel@2.7.9-10.el6_4.1?arch=ppc" } } }, { "category": "product_version", "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "product_id": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-debuginfo@2.7.9-10.el6_4.1?arch=ppc" } } }, { "category": "product_version", "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "product_id": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/pidgin-devel@2.7.9-10.el6_4.1?arch=ppc" } } }, { "category": "product_version", "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "product_id": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple-devel@2.7.9-10.el6_4.1?arch=ppc" } } }, { "category": "product_version", "name": "finch-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "finch-0:2.7.9-10.el6_4.1.ppc", "product_id": "finch-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/finch@2.7.9-10.el6_4.1?arch=ppc" } } }, { "category": "product_version", "name": "libpurple-0:2.7.9-10.el6_4.1.ppc", "product": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc", "product_id": "libpurple-0:2.7.9-10.el6_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpurple@2.7.9-10.el6_4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "finch-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "finch-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "finch-devel-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "finch-devel-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "libpurple-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "libpurple-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "libpurple-devel-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "libpurple-perl-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "pidgin-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.6.6-17.el5_9.1.src as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src" }, "product_reference": "pidgin-0:2.6.6-17.el5_9.1.src", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "pidgin-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "pidgin-devel-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.6.6-17.el5_9.1.i386 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386" }, "product_reference": "pidgin-perl-0:2.6.6-17.el5_9.1.i386", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.6.6-17.el5_9.1.x86_64 as a component of RHEL Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64" }, "product_reference": "pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "relates_to_product_reference": "5Server-DPAS-5.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.src", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.src", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.src", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Server-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.src", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "finch-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.src", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.i686", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" }, "product_reference": "pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.4.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Pidgin project" ] }, { "names": [ "Daniel Atallah" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-0272", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2013-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "910040" } ], "notes": [ { "category": "description", "text": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.", "title": "Vulnerability description" }, { "category": "summary", "text": "pidgin: MXit protocol stack-based buffer overflow when processing HTTP headers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0272" }, { "category": "external", "summary": "RHBZ#910040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910040" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0272", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0272" }, { "category": "external", "summary": "http://www.pidgin.im/news/security/?id=66", "url": "http://www.pidgin.im/news/security/?id=66" } ], "release_date": "2013-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-14T16:45:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0646" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pidgin: MXit protocol stack-based buffer overflow when processing HTTP headers" }, { "acknowledgments": [ { "names": [ "Pidgin project" ] } ], "cve": "CVE-2013-0273", "discovery_date": "2013-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "910041" } ], "notes": [ { "category": "description", "text": "sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "pidgin: Meanwhile protocol missing nul termination of long Lotus Sametime usernames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0273" }, { "category": "external", "summary": "RHBZ#910041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0273", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0273" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0273" }, { "category": "external", "summary": "http://www.pidgin.im/news/security/?id=67", "url": "http://www.pidgin.im/news/security/?id=67" } ], "release_date": "2013-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-14T16:45:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0646" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pidgin: Meanwhile protocol missing nul termination of long Lotus Sametime usernames" }, { "acknowledgments": [ { "names": [ "Pidgin project" ] } ], "cve": "CVE-2013-0274", "discovery_date": "2013-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "910042" } ], "notes": [ { "category": "description", "text": "upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.", "title": "Vulnerability description" }, { "category": "summary", "text": "pidgin: missing nul termination of long values in UPnP responses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0274" }, { "category": "external", "summary": "RHBZ#910042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0274", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0274" }, { "category": "external", "summary": "http://www.pidgin.im/news/security/?id=68", "url": "http://www.pidgin.im/news/security/?id=68" } ], "release_date": "2013-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-03-14T16:45:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0646" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:finch-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-perl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:libpurple-tcl-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.src", "5Server-DPAS-5.9.Z:pidgin-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-debuginfo-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-devel-0:2.6.6-17.el5_9.1.x86_64", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.i386", "5Server-DPAS-5.9.Z:pidgin-perl-0:2.6.6-17.el5_9.1.x86_64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Client-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Client-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Server-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Server-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:finch-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-perl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:libpurple-tcl-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.src", "6Workstation-optional-6.4.z:pidgin-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-debuginfo-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-devel-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-docs-0:2.7.9-10.el6_4.1.x86_64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.i686", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.ppc64", "6Workstation-optional-6.4.z:pidgin-perl-0:2.7.9-10.el6_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pidgin: missing nul termination of long values in UPnP responses" } ] }
fkie_cve-2013-0272
Vulnerability from fkie_nvd
Published
2013-02-16 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html | ||
secalert@redhat.com | http://www.pidgin.im/news/security/?id=66 | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/57951 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-1746-1 | ||
secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.pidgin.im/news/security/?id=66 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/57951 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1746-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
pidgin | pidgin | * | |
pidgin | pidgin | 2.0.0 | |
pidgin | pidgin | 2.0.1 | |
pidgin | pidgin | 2.0.2 | |
pidgin | pidgin | 2.1.0 | |
pidgin | pidgin | 2.1.1 | |
pidgin | pidgin | 2.2.0 | |
pidgin | pidgin | 2.2.1 | |
pidgin | pidgin | 2.2.2 | |
pidgin | pidgin | 2.3.0 | |
pidgin | pidgin | 2.3.1 | |
pidgin | pidgin | 2.4.0 | |
pidgin | pidgin | 2.4.1 | |
pidgin | pidgin | 2.4.2 | |
pidgin | pidgin | 2.4.3 | |
pidgin | pidgin | 2.5.0 | |
pidgin | pidgin | 2.5.1 | |
pidgin | pidgin | 2.5.2 | |
pidgin | pidgin | 2.5.3 | |
pidgin | pidgin | 2.5.4 | |
pidgin | pidgin | 2.5.5 | |
pidgin | pidgin | 2.5.6 | |
pidgin | pidgin | 2.5.7 | |
pidgin | pidgin | 2.5.8 | |
pidgin | pidgin | 2.5.9 | |
pidgin | pidgin | 2.6.0 | |
pidgin | pidgin | 2.6.1 | |
pidgin | pidgin | 2.6.2 | |
pidgin | pidgin | 2.6.4 | |
pidgin | pidgin | 2.6.5 | |
pidgin | pidgin | 2.6.6 | |
pidgin | pidgin | 2.7.0 | |
pidgin | pidgin | 2.7.1 | |
pidgin | pidgin | 2.7.2 | |
pidgin | pidgin | 2.7.3 | |
pidgin | pidgin | 2.7.4 | |
pidgin | pidgin | 2.7.5 | |
pidgin | pidgin | 2.7.6 | |
pidgin | pidgin | 2.7.7 | |
pidgin | pidgin | 2.7.8 | |
pidgin | pidgin | 2.7.9 | |
pidgin | pidgin | 2.7.10 | |
pidgin | pidgin | 2.7.11 | |
pidgin | pidgin | 2.8.0 | |
pidgin | pidgin | 2.9.0 | |
pidgin | pidgin | 2.10.0 | |
pidgin | pidgin | 2.10.1 | |
pidgin | pidgin | 2.10.2 | |
pidgin | pidgin | 2.10.3 | |
pidgin | pidgin | 2.10.4 | |
pidgin | pidgin | 2.10.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B94ED22-0FD0-4A51-887F-8A100C750567", "versionEndIncluding": "2.10.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBC2EBF3-73A7-4542-8E9C-47A4241A224C", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF62072D-4956-4FE6-931E-E6EE9C49F3E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6499D8D5-0801-498C-BD4D-508506918CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73CC76CD-FF35-4B3A-9F1E-4E5A65963057", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F694A1FC-2F10-48F9-8E8D-C88A8E7397AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D22A117-78BE-4BAC-8A2A-6C00C9E3A4C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "59E216BC-29E4-4C31-9CF0-DE22C2E84968", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BD203F7-B983-4FDD-9837-D68D4F388A4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB90B7CB-1A11-45A8-B0BC-9B2143D84A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C8E3CBA-2B33-49EF-9105-8DDBB938F519", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "72AA3282-CA7D-438C-A07C-A63392333630", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEEFF420-2868-422B-BD22-9A5749C2398F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B139D83D-7D18-42C7-988C-2070B66CB943", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "047D9636-BCCE-4956-B5A3-D276F1C2EF2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8A794E-E1CB-4F0F-9739-D625E94EA566", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E64EEEA0-89CE-46BD-B387-A96521E76A6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F6E96AA3-B567-4E97-979A-D97A4F786D55", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "09C407C0-99A2-477B-87CF-6BE9F7B367E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "EBEF0457-39D8-465B-86A7-8DFA44A1F820", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "E593BFF0-650E-4EDB-BF65-C509C8A807C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "E39468D5-1378-4441-B927-5C34C85B18AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "C80012AD-8F49-4287-8AEC-C21AC5774CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "7CB3CF0C-BECE-4685-A370-96424B0A5703", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "3D5BC0FC-2F7D-41BE-83E4-AEDACD71F427", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8321D92-B935-4C2A-81B1-5984BFF4FD57", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "43679F1D-E48D-483B-A67B-9DB8C641F649", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "00032CBA-479E-4880-ACAE-3B0F066C8146", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B11BCF7-3127-4B2E-967F-2B22A229592E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "66E89655-FE9E-4B05-8DF9-59894B81B6D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "6B9A75D8-CFA6-4605-A0CB-AA5EA2FA8316", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD841629-4ADC-4122-A7E1-AED505E48150", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A539AD7F-4D84-4F80-844E-0404813C9384", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "3A55F197-5A6E-48EE-8BB1-C75C19DCBE4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "AE9D5D3E-2565-42CD-9254-F7E5B1980F7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9DFC5300-4BF5-4204-8A6C-0B86998022D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "02865EB9-AFA1-4584-B487-D510350F82D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "E00006E6-1999-4967-8BE9-2B7265F3E6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "61BD8C57-DD49-44C1-BD0A-0A1210C1BE57", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CD573-D9CE-41E6-8FAB-7DBEA4E545F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "2389B152-70AC-47A7-BDAE-3A7F0550E6C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "7A81DAE1-4633-46A9-8DC9-42E6EC1D641B", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "9BE026B2-73D6-43AD-9003-B159992D0323", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "ACCCDDDA-58C9-443A-9D7F-44D362E363C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AC30F6B-4170-4FBF-AA69-B6BBE25EC3C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1337152-04D4-4439-8F49-B6BCE271A3AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "A730DE04-9886-4920-A210-6C41CD77E330", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "E8A7F491-499A-4E1B-B5DB-FC1186DD6672", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "CAEE2341-00C0-48D7-867F-DF18D4BBEE27", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "450890EF-3950-4603-8402-BBD539D6CF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "DF30FFB0-19E7-4385-A752-BEAD0A085CC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en http.c en el plugin de protocolo MXit en libpurple en Pidgin anteiror a v2.10.7 permite a servidores remotos ejecutar c\u00f3digo mediante un header HTTP de gran longitud." } ], "id": "CVE-2013-0272", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-16T21:55:02.153", "references": [ { "source": "secalert@redhat.com", "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.pidgin.im/news/security/?id=66" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/57951" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://hg.pidgin.im/pidgin/main/rev/879db2a9a59c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.pidgin.im/news/security/?id=66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/57951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1746-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17474" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10432-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
finch-2.11.0-4.1 on GA media
Notes
Title of the patch
finch-2.11.0-4.1 on GA media
Description of the patch
These are all security issues fixed in the finch-2.11.0-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10432
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "finch-2.11.0-4.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the finch-2.11.0-4.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10432", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10432-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-2694 page", "url": "https://www.suse.com/security/cve/CVE-2009-2694/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-2703 page", "url": "https://www.suse.com/security/cve/CVE-2009-2703/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3026 page", "url": "https://www.suse.com/security/cve/CVE-2009-3026/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3083 page", "url": "https://www.suse.com/security/cve/CVE-2009-3083/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3084 page", "url": "https://www.suse.com/security/cve/CVE-2009-3084/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3085 page", "url": "https://www.suse.com/security/cve/CVE-2009-3085/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3615 page", "url": "https://www.suse.com/security/cve/CVE-2009-3615/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0013 page", "url": "https://www.suse.com/security/cve/CVE-2010-0013/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0277 page", "url": "https://www.suse.com/security/cve/CVE-2010-0277/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0420 page", "url": "https://www.suse.com/security/cve/CVE-2010-0420/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-0423 page", "url": "https://www.suse.com/security/cve/CVE-2010-0423/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1624 page", "url": "https://www.suse.com/security/cve/CVE-2010-1624/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2528 page", "url": "https://www.suse.com/security/cve/CVE-2010-2528/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3711 page", "url": "https://www.suse.com/security/cve/CVE-2010-3711/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1091 page", "url": "https://www.suse.com/security/cve/CVE-2011-1091/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-3594 page", "url": "https://www.suse.com/security/cve/CVE-2011-3594/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2214 page", "url": "https://www.suse.com/security/cve/CVE-2012-2214/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3374 page", "url": "https://www.suse.com/security/cve/CVE-2012-3374/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6152 page", "url": "https://www.suse.com/security/cve/CVE-2012-6152/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0271 page", "url": "https://www.suse.com/security/cve/CVE-2013-0271/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0272 page", "url": "https://www.suse.com/security/cve/CVE-2013-0272/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0273 page", "url": "https://www.suse.com/security/cve/CVE-2013-0273/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0274 page", "url": "https://www.suse.com/security/cve/CVE-2013-0274/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6477 page", "url": "https://www.suse.com/security/cve/CVE-2013-6477/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6478 page", "url": "https://www.suse.com/security/cve/CVE-2013-6478/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6479 page", "url": "https://www.suse.com/security/cve/CVE-2013-6479/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6481 page", "url": "https://www.suse.com/security/cve/CVE-2013-6481/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6482 page", "url": "https://www.suse.com/security/cve/CVE-2013-6482/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6483 page", "url": "https://www.suse.com/security/cve/CVE-2013-6483/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6484 page", "url": "https://www.suse.com/security/cve/CVE-2013-6484/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6485 page", "url": "https://www.suse.com/security/cve/CVE-2013-6485/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6486 page", "url": "https://www.suse.com/security/cve/CVE-2013-6486/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6487 page", "url": "https://www.suse.com/security/cve/CVE-2013-6487/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0020 page", "url": "https://www.suse.com/security/cve/CVE-2014-0020/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3694 page", "url": "https://www.suse.com/security/cve/CVE-2014-3694/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3695 page", "url": "https://www.suse.com/security/cve/CVE-2014-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3696 page", "url": "https://www.suse.com/security/cve/CVE-2014-3696/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3697 page", "url": "https://www.suse.com/security/cve/CVE-2014-3697/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3698 page", "url": "https://www.suse.com/security/cve/CVE-2014-3698/" } ], "title": "finch-2.11.0-4.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10432-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "finch-2.11.0-4.1.aarch64", "product": { "name": "finch-2.11.0-4.1.aarch64", "product_id": "finch-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "finch-devel-2.11.0-4.1.aarch64", "product": { "name": "finch-devel-2.11.0-4.1.aarch64", "product_id": "finch-devel-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-2.11.0-4.1.aarch64", "product": { "name": "libpurple-2.11.0-4.1.aarch64", "product_id": "libpurple-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-branding-upstream-2.11.0-4.1.aarch64", "product": { "name": "libpurple-branding-upstream-2.11.0-4.1.aarch64", "product_id": "libpurple-branding-upstream-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-devel-2.11.0-4.1.aarch64", "product": { "name": "libpurple-devel-2.11.0-4.1.aarch64", "product_id": "libpurple-devel-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-lang-2.11.0-4.1.aarch64", "product": { "name": "libpurple-lang-2.11.0-4.1.aarch64", "product_id": "libpurple-lang-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-plugin-sametime-2.11.0-4.1.aarch64", "product": { "name": "libpurple-plugin-sametime-2.11.0-4.1.aarch64", "product_id": "libpurple-plugin-sametime-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "libpurple-tcl-2.11.0-4.1.aarch64", "product": { "name": "libpurple-tcl-2.11.0-4.1.aarch64", "product_id": "libpurple-tcl-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "pidgin-2.11.0-4.1.aarch64", "product": { "name": "pidgin-2.11.0-4.1.aarch64", "product_id": "pidgin-2.11.0-4.1.aarch64" } }, { "category": "product_version", "name": "pidgin-devel-2.11.0-4.1.aarch64", "product": { "name": "pidgin-devel-2.11.0-4.1.aarch64", "product_id": "pidgin-devel-2.11.0-4.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "finch-2.11.0-4.1.ppc64le", "product": { "name": "finch-2.11.0-4.1.ppc64le", "product_id": "finch-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "finch-devel-2.11.0-4.1.ppc64le", "product": { "name": "finch-devel-2.11.0-4.1.ppc64le", "product_id": "finch-devel-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-2.11.0-4.1.ppc64le", "product_id": "libpurple-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-branding-upstream-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-branding-upstream-2.11.0-4.1.ppc64le", "product_id": "libpurple-branding-upstream-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-devel-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-devel-2.11.0-4.1.ppc64le", "product_id": "libpurple-devel-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-lang-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-lang-2.11.0-4.1.ppc64le", "product_id": "libpurple-lang-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "product_id": "libpurple-plugin-sametime-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "libpurple-tcl-2.11.0-4.1.ppc64le", "product": { "name": "libpurple-tcl-2.11.0-4.1.ppc64le", "product_id": "libpurple-tcl-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "pidgin-2.11.0-4.1.ppc64le", "product": { "name": "pidgin-2.11.0-4.1.ppc64le", "product_id": "pidgin-2.11.0-4.1.ppc64le" } }, { "category": "product_version", "name": "pidgin-devel-2.11.0-4.1.ppc64le", "product": { "name": "pidgin-devel-2.11.0-4.1.ppc64le", "product_id": "pidgin-devel-2.11.0-4.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "finch-2.11.0-4.1.s390x", "product": { "name": "finch-2.11.0-4.1.s390x", "product_id": "finch-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "finch-devel-2.11.0-4.1.s390x", "product": { "name": "finch-devel-2.11.0-4.1.s390x", "product_id": "finch-devel-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-2.11.0-4.1.s390x", "product": { "name": "libpurple-2.11.0-4.1.s390x", "product_id": "libpurple-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-branding-upstream-2.11.0-4.1.s390x", "product": { "name": "libpurple-branding-upstream-2.11.0-4.1.s390x", "product_id": "libpurple-branding-upstream-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-devel-2.11.0-4.1.s390x", "product": { "name": "libpurple-devel-2.11.0-4.1.s390x", "product_id": "libpurple-devel-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-lang-2.11.0-4.1.s390x", "product": { "name": "libpurple-lang-2.11.0-4.1.s390x", "product_id": "libpurple-lang-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-plugin-sametime-2.11.0-4.1.s390x", "product": { "name": "libpurple-plugin-sametime-2.11.0-4.1.s390x", "product_id": "libpurple-plugin-sametime-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "libpurple-tcl-2.11.0-4.1.s390x", "product": { "name": "libpurple-tcl-2.11.0-4.1.s390x", "product_id": "libpurple-tcl-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "pidgin-2.11.0-4.1.s390x", "product": { "name": "pidgin-2.11.0-4.1.s390x", "product_id": "pidgin-2.11.0-4.1.s390x" } }, { "category": "product_version", "name": "pidgin-devel-2.11.0-4.1.s390x", "product": { "name": "pidgin-devel-2.11.0-4.1.s390x", "product_id": "pidgin-devel-2.11.0-4.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "finch-2.11.0-4.1.x86_64", "product": { "name": "finch-2.11.0-4.1.x86_64", "product_id": "finch-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "finch-devel-2.11.0-4.1.x86_64", "product": { "name": "finch-devel-2.11.0-4.1.x86_64", "product_id": "finch-devel-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-2.11.0-4.1.x86_64", "product": { "name": "libpurple-2.11.0-4.1.x86_64", "product_id": "libpurple-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-branding-upstream-2.11.0-4.1.x86_64", "product": { "name": "libpurple-branding-upstream-2.11.0-4.1.x86_64", "product_id": "libpurple-branding-upstream-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-devel-2.11.0-4.1.x86_64", "product": { "name": "libpurple-devel-2.11.0-4.1.x86_64", "product_id": "libpurple-devel-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-lang-2.11.0-4.1.x86_64", "product": { "name": "libpurple-lang-2.11.0-4.1.x86_64", "product_id": "libpurple-lang-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-plugin-sametime-2.11.0-4.1.x86_64", "product": { "name": "libpurple-plugin-sametime-2.11.0-4.1.x86_64", "product_id": "libpurple-plugin-sametime-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "libpurple-tcl-2.11.0-4.1.x86_64", "product": { "name": "libpurple-tcl-2.11.0-4.1.x86_64", "product_id": "libpurple-tcl-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "pidgin-2.11.0-4.1.x86_64", "product": { "name": "pidgin-2.11.0-4.1.x86_64", "product_id": "pidgin-2.11.0-4.1.x86_64" } }, { "category": "product_version", "name": "pidgin-devel-2.11.0-4.1.x86_64", "product": { "name": "pidgin-devel-2.11.0-4.1.x86_64", "product_id": "pidgin-devel-2.11.0-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "finch-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64" }, "product_reference": "finch-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le" }, "product_reference": "finch-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x" }, "product_reference": "finch-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64" }, "product_reference": "finch-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64" }, "product_reference": "finch-devel-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le" }, "product_reference": "finch-devel-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x" }, "product_reference": "finch-devel-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "finch-devel-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64" }, "product_reference": "finch-devel-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x" }, "product_reference": "libpurple-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-branding-upstream-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-branding-upstream-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-branding-upstream-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-branding-upstream-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-branding-upstream-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x" }, "product_reference": "libpurple-branding-upstream-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-branding-upstream-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-branding-upstream-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-devel-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-devel-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x" }, "product_reference": "libpurple-devel-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-devel-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-devel-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-lang-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-lang-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-lang-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-lang-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-lang-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x" }, "product_reference": "libpurple-lang-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-lang-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-lang-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-plugin-sametime-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-plugin-sametime-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-plugin-sametime-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-plugin-sametime-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x" }, "product_reference": "libpurple-plugin-sametime-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-plugin-sametime-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-plugin-sametime-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64" }, "product_reference": "libpurple-tcl-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le" }, "product_reference": "libpurple-tcl-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x" }, "product_reference": "libpurple-tcl-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libpurple-tcl-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64" }, "product_reference": "libpurple-tcl-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64" }, "product_reference": "pidgin-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le" }, "product_reference": "pidgin-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x" }, "product_reference": "pidgin-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64" }, "product_reference": "pidgin-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-2.11.0-4.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64" }, "product_reference": "pidgin-devel-2.11.0-4.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-2.11.0-4.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le" }, "product_reference": "pidgin-devel-2.11.0-4.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-2.11.0-4.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x" }, "product_reference": "pidgin-devel-2.11.0-4.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "pidgin-devel-2.11.0-4.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" }, "product_reference": "pidgin-devel-2.11.0-4.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-2694" } ], "notes": [ { "category": "general", "text": "The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-2694", "url": "https://www.suse.com/security/cve/CVE-2009-2694" }, { "category": "external", "summary": "SUSE Bug 527100 for CVE-2009-2694", "url": "https://bugzilla.suse.com/527100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2009-2694" }, { "cve": "CVE-2009-2703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-2703" } ], "notes": [ { "category": "general", "text": "libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-2703", "url": "https://www.suse.com/security/cve/CVE-2009-2703" }, { "category": "external", "summary": "SUSE Bug 537214 for CVE-2009-2703", "url": "https://bugzilla.suse.com/537214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-2703" }, { "cve": "CVE-2009-3026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3026" } ], "notes": [ { "category": "general", "text": "protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the \"require TLS/SSL\" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3026", "url": "https://www.suse.com/security/cve/CVE-2009-3026" }, { "category": "external", "summary": "SUSE Bug 535570 for CVE-2009-3026", "url": "https://bugzilla.suse.com/535570" }, { "category": "external", "summary": "SUSE Bug 550170 for CVE-2009-3026", "url": "https://bugzilla.suse.com/550170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-3026" }, { "cve": "CVE-2009-3083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3083" } ], "notes": [ { "category": "general", "text": "The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3083", "url": "https://www.suse.com/security/cve/CVE-2009-3083" }, { "category": "external", "summary": "SUSE Bug 536602 for CVE-2009-3083", "url": "https://bugzilla.suse.com/536602" }, { "category": "external", "summary": "SUSE Bug 550170 for CVE-2009-3083", "url": "https://bugzilla.suse.com/550170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-3083" }, { "cve": "CVE-2009-3084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3084" } ], "notes": [ { "category": "general", "text": "The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect \"UTF16-LE\" charset name.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3084", "url": "https://www.suse.com/security/cve/CVE-2009-3084" }, { "category": "external", "summary": "SUSE Bug 536602 for CVE-2009-3084", "url": "https://bugzilla.suse.com/536602" }, { "category": "external", "summary": "SUSE Bug 550170 for CVE-2009-3084", "url": "https://bugzilla.suse.com/550170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-3084" }, { "cve": "CVE-2009-3085", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3085" } ], "notes": [ { "category": "general", "text": "The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3085", "url": "https://www.suse.com/security/cve/CVE-2009-3085" }, { "category": "external", "summary": "SUSE Bug 536602 for CVE-2009-3085", "url": "https://bugzilla.suse.com/536602" }, { "category": "external", "summary": "SUSE Bug 550170 for CVE-2009-3085", "url": "https://bugzilla.suse.com/550170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-3085" }, { "cve": "CVE-2009-3615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3615" } ], "notes": [ { "category": "general", "text": "The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3615", "url": "https://www.suse.com/security/cve/CVE-2009-3615" }, { "category": "external", "summary": "SUSE Bug 548072 for CVE-2009-3615", "url": "https://bugzilla.suse.com/548072" }, { "category": "external", "summary": "SUSE Bug 550170 for CVE-2009-3615", "url": "https://bugzilla.suse.com/550170" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-3615" }, { "cve": "CVE-2010-0013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0013" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122. NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0013", "url": "https://www.suse.com/security/cve/CVE-2010-0013" }, { "category": "external", "summary": "SUSE Bug 567799 for CVE-2010-0013", "url": "https://bugzilla.suse.com/567799" }, { "category": "external", "summary": "SUSE Bug 569616 for CVE-2010-0013", "url": "https://bugzilla.suse.com/569616" }, { "category": "external", "summary": "SUSE Bug 581201 for CVE-2010-0013", "url": "https://bugzilla.suse.com/581201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-0013" }, { "cve": "CVE-2010-0277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0277" } ], "notes": [ { "category": "general", "text": "slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0277", "url": "https://www.suse.com/security/cve/CVE-2010-0277" }, { "category": "external", "summary": "SUSE Bug 567799 for CVE-2010-0277", "url": "https://bugzilla.suse.com/567799" }, { "category": "external", "summary": "SUSE Bug 569616 for CVE-2010-0277", "url": "https://bugzilla.suse.com/569616" }, { "category": "external", "summary": "SUSE Bug 581201 for CVE-2010-0277", "url": "https://bugzilla.suse.com/581201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-0277" }, { "cve": "CVE-2010-0420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0420" } ], "notes": [ { "category": "general", "text": "libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing \u003cbr\u003e sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0420", "url": "https://www.suse.com/security/cve/CVE-2010-0420" }, { "category": "external", "summary": "SUSE Bug 569616 for CVE-2010-0420", "url": "https://bugzilla.suse.com/569616" }, { "category": "external", "summary": "SUSE Bug 581201 for CVE-2010-0420", "url": "https://bugzilla.suse.com/581201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-0420" }, { "cve": "CVE-2010-0423", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-0423" } ], "notes": [ { "category": "general", "text": "gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-0423", "url": "https://www.suse.com/security/cve/CVE-2010-0423" }, { "category": "external", "summary": "SUSE Bug 569616 for CVE-2010-0423", "url": "https://bugzilla.suse.com/569616" }, { "category": "external", "summary": "SUSE Bug 581201 for CVE-2010-0423", "url": "https://bugzilla.suse.com/581201" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-0423" }, { "cve": "CVE-2010-1624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1624" } ], "notes": [ { "category": "general", "text": "The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1624", "url": "https://www.suse.com/security/cve/CVE-2010-1624" }, { "category": "external", "summary": "SUSE Bug 604225 for CVE-2010-1624", "url": "https://bugzilla.suse.com/604225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1624" }, { "cve": "CVE-2010-2528", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2528" } ], "notes": [ { "category": "general", "text": "The clientautoresp function in family_icbm.c in the oscar protocol plugin in libpurple in Pidgin before 2.7.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via an X-Status message that lacks the expected end tag for a (1) desc or (2) title element.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2528", "url": "https://www.suse.com/security/cve/CVE-2010-2528" }, { "category": "external", "summary": "SUSE Bug 630965 for CVE-2010-2528", "url": "https://bugzilla.suse.com/630965" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2528" }, { "cve": "CVE-2010-3711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3711" } ], "notes": [ { "category": "general", "text": "libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3711", "url": "https://www.suse.com/security/cve/CVE-2010-3711" }, { "category": "external", "summary": "SUSE Bug 648273 for CVE-2010-3711", "url": "https://bugzilla.suse.com/648273" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3711" }, { "cve": "CVE-2011-1091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1091" } ], "notes": [ { "category": "general", "text": "libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1091", "url": "https://www.suse.com/security/cve/CVE-2011-1091" }, { "category": "external", "summary": "SUSE Bug 736189 for CVE-2011-1091", "url": "https://bugzilla.suse.com/736189" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-1091" }, { "cve": "CVE-2011-3594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-3594" } ], "notes": [ { "category": "general", "text": "The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-3594", "url": "https://www.suse.com/security/cve/CVE-2011-3594" }, { "category": "external", "summary": "SUSE Bug 722199 for CVE-2011-3594", "url": "https://bugzilla.suse.com/722199" }, { "category": "external", "summary": "SUSE Bug 736161 for CVE-2011-3594", "url": "https://bugzilla.suse.com/736161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-3594" }, { "cve": "CVE-2012-2214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2214" } ], "notes": [ { "category": "general", "text": "proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2214", "url": "https://www.suse.com/security/cve/CVE-2012-2214" }, { "category": "external", "summary": "SUSE Bug 760890 for CVE-2012-2214", "url": "https://bugzilla.suse.com/760890" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2214" }, { "cve": "CVE-2012-3374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3374" } ], "notes": [ { "category": "general", "text": "Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3374", "url": "https://www.suse.com/security/cve/CVE-2012-3374" }, { "category": "external", "summary": "SUSE Bug 770304 for CVE-2012-3374", "url": "https://bugzilla.suse.com/770304" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3374" }, { "cve": "CVE-2012-6152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6152" } ], "notes": [ { "category": "general", "text": "The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6152", "url": "https://www.suse.com/security/cve/CVE-2012-6152" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2012-6152", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-6152" }, { "cve": "CVE-2013-0271", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0271" } ], "notes": [ { "category": "general", "text": "The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0271", "url": "https://www.suse.com/security/cve/CVE-2013-0271" }, { "category": "external", "summary": "SUSE Bug 804742 for CVE-2013-0271", "url": "https://bugzilla.suse.com/804742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0271" }, { "cve": "CVE-2013-0272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0272" } ], "notes": [ { "category": "general", "text": "Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0272", "url": "https://www.suse.com/security/cve/CVE-2013-0272" }, { "category": "external", "summary": "SUSE Bug 804742 for CVE-2013-0272", "url": "https://bugzilla.suse.com/804742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0272" }, { "cve": "CVE-2013-0273", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0273" } ], "notes": [ { "category": "general", "text": "sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0273", "url": "https://www.suse.com/security/cve/CVE-2013-0273" }, { "category": "external", "summary": "SUSE Bug 804742 for CVE-2013-0273", "url": "https://bugzilla.suse.com/804742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0273" }, { "cve": "CVE-2013-0274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0274" } ], "notes": [ { "category": "general", "text": "upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0274", "url": "https://www.suse.com/security/cve/CVE-2013-0274" }, { "category": "external", "summary": "SUSE Bug 804742 for CVE-2013-0274", "url": "https://bugzilla.suse.com/804742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-0274" }, { "cve": "CVE-2013-6477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6477" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6477", "url": "https://www.suse.com/security/cve/CVE-2013-6477" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6477", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6477" }, { "cve": "CVE-2013-6478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6478" } ], "notes": [ { "category": "general", "text": "gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6478", "url": "https://www.suse.com/security/cve/CVE-2013-6478" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6478", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6478" }, { "cve": "CVE-2013-6479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6479" } ], "notes": [ { "category": "general", "text": "util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6479", "url": "https://www.suse.com/security/cve/CVE-2013-6479" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6479", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6479" }, { "cve": "CVE-2013-6481", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6481" } ], "notes": [ { "category": "general", "text": "libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6481", "url": "https://www.suse.com/security/cve/CVE-2013-6481" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6481", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6481" }, { "cve": "CVE-2013-6482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6482" } ], "notes": [ { "category": "general", "text": "Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6482", "url": "https://www.suse.com/security/cve/CVE-2013-6482" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6482", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6482" }, { "cve": "CVE-2013-6483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6483" } ], "notes": [ { "category": "general", "text": "The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6483", "url": "https://www.suse.com/security/cve/CVE-2013-6483" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6483", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6483" }, { "cve": "CVE-2013-6484", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6484" } ], "notes": [ { "category": "general", "text": "The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6484", "url": "https://www.suse.com/security/cve/CVE-2013-6484" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6484", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6484" }, { "cve": "CVE-2013-6485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6485" } ], "notes": [ { "category": "general", "text": "Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6485", "url": "https://www.suse.com/security/cve/CVE-2013-6485" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6485", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6485" }, { "cve": "CVE-2013-6486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6486" } ], "notes": [ { "category": "general", "text": "gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6486", "url": "https://www.suse.com/security/cve/CVE-2013-6486" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6486", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2013-6486" }, { "cve": "CVE-2013-6487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6487" } ], "notes": [ { "category": "general", "text": "Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6487", "url": "https://www.suse.com/security/cve/CVE-2013-6487" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2013-6487", "url": "https://bugzilla.suse.com/861019" }, { "category": "external", "summary": "SUSE Bug 878540 for CVE-2013-6487", "url": "https://bugzilla.suse.com/878540" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-6487" }, { "cve": "CVE-2014-0020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0020" } ], "notes": [ { "category": "general", "text": "The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0020", "url": "https://www.suse.com/security/cve/CVE-2014-0020" }, { "category": "external", "summary": "SUSE Bug 861019 for CVE-2014-0020", "url": "https://bugzilla.suse.com/861019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0020" }, { "cve": "CVE-2014-3694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3694" } ], "notes": [ { "category": "general", "text": "The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3694", "url": "https://www.suse.com/security/cve/CVE-2014-3694" }, { "category": "external", "summary": "SUSE Bug 902495 for CVE-2014-3694", "url": "https://bugzilla.suse.com/902495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3694" }, { "cve": "CVE-2014-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3695" } ], "notes": [ { "category": "general", "text": "markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3695", "url": "https://www.suse.com/security/cve/CVE-2014-3695" }, { "category": "external", "summary": "SUSE Bug 902409 for CVE-2014-3695", "url": "https://bugzilla.suse.com/902409" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3695" }, { "cve": "CVE-2014-3696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3696" } ], "notes": [ { "category": "general", "text": "nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3696", "url": "https://www.suse.com/security/cve/CVE-2014-3696" }, { "category": "external", "summary": "SUSE Bug 902410 for CVE-2014-3696", "url": "https://bugzilla.suse.com/902410" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3696" }, { "cve": "CVE-2014-3697", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3697" } ], "notes": [ { "category": "general", "text": "Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3697", "url": "https://www.suse.com/security/cve/CVE-2014-3697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3697" }, { "cve": "CVE-2014-3698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3698" } ], "notes": [ { "category": "general", "text": "The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3698", "url": "https://www.suse.com/security/cve/CVE-2014-3698" }, { "category": "external", "summary": "SUSE Bug 902408 for CVE-2014-3698", "url": "https://bugzilla.suse.com/902408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:finch-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:finch-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-branding-upstream-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-devel-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-lang-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-plugin-sametime-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.s390x", "openSUSE Tumbleweed:libpurple-tcl-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-2.11.0-4.1.x86_64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.aarch64", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.ppc64le", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.s390x", "openSUSE Tumbleweed:pidgin-devel-2.11.0-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3698" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…