Slackware Security Announcement 2009-08-19 pidgin (SSA:2009-231-02)


[slackware-security] pidgin (SSA:2009-231-02)


New pidgin packages are available for Slackware 12.0, 12.1, 12.2, and -current

to fix a security issue.


More details about this issue may be found in the Common

Vulnerabilities and Exposures (CVE) database:



Here are the details from the Slackware 12.2 ChangeLog:



This update fixes a bug in Pidgin’s MSN protocol implementation that can

allow a remote attacker to send a malicious MSN message to a Pidgin user,

which will possibly cause arbitrary code to be executed as that user.

This issue was discovered by Federico Muttis of Core Security Technologies.

For more information, see:

(* Security fix *)




Where to find the new packages:



HINT: Getting slow download speeds from

Give a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from


Thanks to the friendly folks at the OSU Open Source Lab

( for donating additional FTP and rsync hosting

to the Slackware project! 🙂


Also see the “Get Slack” section on for

additional mirror sites near you.


Updated package for Slackware 12.0:


Updated package for Slackware 12.1:


Updated package for Slackware 12.2:


Updated package for Slackware -current:


Updated package for Slackware64 -current:



MD5 signatures:



Slackware 12.0 package:

3ce9ef2fb489919027f5fd48aecfe16e pidgin-2.5.9-i486-1_slack12.0.tgz


Slackware 12.1 package:

ab5b36db9e7f97b845672d030b64b999 pidgin-2.5.9-i486-1_slack12.1.tgz


Slackware 12.2 package:

befadfc8dde193789bcee91f7f33f8ba pidgin-2.5.9-i486-1_slack12.2.tgz


Slackware -current package:

4bc5945ad08e4fa5ebefcd1c5fc9c932 pidgin-2.5.9-i486-1.txz


Slackware64 -current package:

0a18668ccb5cd223e56789c871997769 pidgin-2.5.9-x86_64-1.txz



Installation instructions:



Upgrade the package as root:

# upgradepkg pidgin-2.5.9-i486-1_slack12.2.tgz





Slackware Linux Security Team

This e-mail address is being protected from spambots. You need JavaScript enabled to view it