Slackware Security Announcement 2009-290-02: pidgin


[slackware-security] pidgin (SSA:2009-290-02)


New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0,

and -current to fix a security issue.


More details about this issue may be found in the Common

Vulnerabilities and Exposures (CVE) database:



Here are the details from the Slackware 13.0 ChangeLog:



This update fixes an issue where a remote user can cause libpurple-based

clients to crash.

For more information, see:

(* Security fix *)




Where to find the new packages:



HINT: Getting slow download speeds from

Give a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from


Thanks to the friendly folks at the OSU Open Source Lab

( for donating additional FTP and rsync hosting

to the Slackware project! 🙂


Also see the “Get Slack” section on for

additional mirror sites near you.


Updated package for Slackware 12.0:


Updated package for Slackware 12.1:


Updated package for Slackware 12.2:


Updated package for Slackware 13.0:


Updated package for Slackware x86_64 13.0:


Updated package for Slackware -current:


Updated package for Slackware x86_64 -current:



MD5 signatures:



Slackware 12.0 package:

2ebd4a84902d4818abf41ab8bbab51a2 pidgin-2.6.3-i486-1_slack12.0.tgz


Slackware 12.1 package:

defa9ff74babdc19b387bfbb3484390b pidgin-2.6.3-i486-1_slack12.1.tgz


Slackware 12.2 package:

a607298ba37e4c36209cc0f0c0746503 pidgin-2.6.3-i486-1_slack12.2.tgz


Slackware 13.0 package:

7680b89972f3746f95f3e89721bc5456 pidgin-2.6.3-i486-1_slack13.0.txz


Slackware x86_64 13.0 package:

5b601d403720ca39836e27b13a3eb4aa pidgin-2.6.3-x86_64-1_slack13.0.txz


Slackware -current package:

fe3e8eb2bb9cf6628f89a339e24b1f61 pidgin-2.6.3-i486-1.txz


Slackware x86_64 -current package:

9ff24734eafd69437d240154c5e5d8fb pidgin-2.6.3-x86_64-1.txz



Installation instructions:



Upgrade the package as root:

# upgradepkg pidgin-2.6.3-i486-1_slack13.0.txz





Slackware Linux Security Team

This e-mail address is being protected from spambots. You need JavaScript enabled to view it