From Mageia wiki
Jump to: navigation, search

MGASA-2013-0096

Date: March 16rd, 2013
Affected releases: 2
Media: Core


Description:
Updated telepathy-gabble packages fix security vulnerability:

NULL pointer dereference in telepathy-gabble before 0.16.5 which causes a
crash when processing weirdly-shaped data forms in caps query replies. This
bug can be triggered by any XMPP user who knows the bare JID of a user of a
vulnerable client, without needing to be authorized to see that user's
presence (CVE-2013-1769).

The telepathy-gabble package has been updated to version to 0.16.5 to fix
this issue as well as several other bugs.

Updated Packages:
i586:
telepathy-gabble-0.16.5-1.mga2.i586.rpm
telepathy-gabble-debug-0.16.5-1.mga2.i586.rpm

x86_64:
telepathy-gabble-0.16.5-1.mga2.x86_64.rpm
telepathy-gabble-debug-0.16.5-1.mga2.x86_64.rpm

SRPMS:
telepathy-gabble-0.16.5-1.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769
http://lists.freedesktop.org/archives/telepathy/2013-March/006379.html
https://bugs.freedesktop.org/show_bug.cgi?id=61433
http://lists.freedesktop.org/archives/telepathy/2013-March/006377.html
http://lists.freedesktop.org/archives/telepathy/2012-November/006299.html
http://lists.freedesktop.org/archives/telepathy/2012-September/006234.html
http://lists.freedesktop.org/archives/telepathy/2012-August/006224.html
http://lists.freedesktop.org/archives/telepathy/2012-June/006145.html
https://bugs.mageia.org/show_bug.cgi?id=9316