GTK+-Based Multiprotocol Instant Messaging Client

Edit Package pidgin

Pidgin allows you to talk to anyone using a variety of messaging
protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu, ICQ,
IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and Zephyr.
These protocols are implemented using a modular, easy to use design. To
use a protocol, just add an account using the account editor.

Pidgin supports many common features of other clients, as well as many
unique features, such as Perl scripting, TCL scripting and C plugins.

Pidgin is not affiliated with or endorsed by America Online, Inc.,
Microsoft Corporation, Yahoo! Inc., or ICQ Inc.

Refresh
Refresh
Source Files
Filename Size Changed
VUL-fixes.patch 0000013753 13.4 KB
fix-msn-utf8.patch 0000004113 4.02 KB
pidgin-2.7.9.tar.bz2 0009965575 9.5 MB
pidgin-CVE-2013-0272.patch 0000001407 1.37 KB
pidgin-CVE-2013-0273.patch 0000000731 731 Bytes
pidgin-CVE-2013-0274.patch 0000002671 2.61 KB
pidgin-NLD-smiley-theme.tar.bz2 0000020019 19.5 KB
pidgin-Tango-smiley-theme.tar.bz2 0000013938 13.6 KB
pidgin-dbus-invalid-gpointer.patch 0000000791 791 Bytes
pidgin-gnome-keyring.patch 0000006229 6.08 KB
pidgin-mono-buildfix.patch 0000000365 365 Bytes
pidgin-nonblock-common.patch 0000025303 24.7 KB
pidgin-nonblock-common2.patch 0000000511 511 Bytes
pidgin-nonblock-gwim.patch 0000002600 2.54 KB
pidgin.changes 0000057590 56.2 KB
pidgin.spec 0000017659 17.2 KB
remotely-trigger-able-crash.patch 0000001901 1.86 KB
silc-fixutf8-securitybug.patch 0000000828 828 Bytes
Latest Revision
Stefan Lijewski's avatar Stefan Lijewski (lijews) accepted request 157377 from Stefan Lijewski's avatar Stefan Lijewski (lijews) (revision 7)
- bnc#804742 patches: pidgin-CVE-2013-0272.patch,
  pidgin-CVE-2013-0273.patch, pidgin-CVE-2013-0274.patch
- Fix a crash when receiving UPnP responses with abnormally long
  values. (CVE-2013-0274)
- Fix a crash in Sametime when a malicious server sends us an
  abnormally long user ID. (CVE-2013-0273)
- Fix a bug where the MXit server or a man-in-the-middle could
  potentially send specially crafted data that could overflow a buffer
  and lead to a crash or remote code execution.(CVE-2013-0272)
Comments 0
openSUSE Build Service is sponsored by